1. Oluwafemi, J., Feng, J.: How users perceive authentication of choice on mobile devices. In: 13th International Conference on Advances in Computer-Human Interactions. pp. 345–351. ACHI, Spain (2020)
2. Nilesh, A., Salendra, P., Mohammed, F.: A review of authentication methods. IJSTR 5(11), 246–249 (2016)
3. Lampson, B.: Computer security in the real world. IEEE Comput. 37(6), 37–46 (2004)
4. Authentication Methods: https://www.uio.no/studier/emner/matnat/ifi/INF5261/v10/studentprojects/authentication-methods/FinalReportAuthenticationMethods.pdf. Accessed 14 Jan 2022
5. Introduction to Biometrics Technologies and Applications: CyLab Carnegie Mellon https://users.ece.cmu.edu/~jzhu/class/18200/F06/L10A_Savvides_Biometrics.pdf. Accessed 16 Jan 2022