[1]
Sairamesh Konidala, “Understanding the different types of authentication methods ”, Australian Journal of Machine Learning Research & Applications, vol. 2, no. 2, pp. 385–406, Nov. 2022, Accessed: Jan. 07, 2025. [Online]. Available: https://sydneyacademics.com/index.php/ajmlra/article/view/227