1. A review of authentication methods;Lal;International Journal of Scientific and Technological Research,2016
2. 2CAuth: A mtnew two-factor authentication scheme using QR-code;Harini;International Journal of Engineering and Technology,2013
3. A survey process of attacks on irisbased recognition for biometric authentication;Lalithamani
4. Cyber attackers Double Down on Bypassing MFA;Robert;Dark Reading: Threat Intelligence,2023
5. A Systematic Survey of Multi-Factor Authentication for Cloud Infrastructure