1. Ahmad, M., et al.: Security, usability, and biometric authentication scheme for electronic voting using multiple keys. Int. J. Distrib. Sens. Netw. 16(7), 1550147720944025 (2020)
2. Ajibade, P.: Technology acceptance model limitations and criticisms: exploring the practical applications and use in technology-related studies, mixed-method, and qualitative researches. Libr. Philos. Pract. 9, 197–255 (2018)
3. Ajzen, I., Fishbein, M., Lohmann, S., Albarracín, D.: The influence of attitudes on behaviour. In: The Handbook of Attitudes, pp. 197–255 (2018)
4. Ani, U.D., Watson, J.M., Nurse, J.R., Cook, A., Maples, C.: A review of critical infrastructure protection approaches: improving security through responsiveness to the dynamic modelling landscape (2019)
5. Beigi, H.: Access control through multifactor authentication with multimodal biometrics. United States patent US 10,042,993 [BCPRS13] Bolle RM, Connell JH, Pankanti NK (2018)