Sairamesh Konidala (2022) “Understanding the different types of authentication methods ”, Australian Journal of Machine Learning Research & Applications, 2(2), pp. 385–406. Available at: https://sydneyacademics.com/index.php/ajmlra/article/view/225 (Accessed: 7 January 2025).