1. 2FA might be secure, but it’s not usable: A summative usability assessment of Google’s two-factor authentication (2FA) methods;Acemyan;Proceedings of the Human Factors and Ergonomics Society Annual Meeting, Pennsylvania,2018
2. Crypto hash algorithm-based blockchain technology for managing decentralized ledger database in oil and gas industry;Ajao;J — Multidisciplinary Scientific Journal,2019
3. DHT- and blockchain-based smart identification for video conferencing;Alizadeh;Blockchain: Research and Applications,2022
4. Blockchain technology in the energy sector: A systematic review of challenges and opportunities;Andoni;Renewable and Sustainable Energy Reviews,2019
5. Archana, B. S., Chandrashekar, A., Bangi, A. G., Sanjana, B. M., & Akram, S., 2017. Survey on usable and secure two-factor authentication. In Proceedings of the 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology, Bangalore, India. IEEE. https://ieeexplore.ieee.org/document/8256716.