[1]
Izabela Szczygieł, Sebastian Florczak, and Adrian Jasiak, “Two-factor authentication (2FA) comparison of methods and applications”, AWDJ, vol. 1, no. 1, Oct. 2023, doi: 10.5281/zenodo.10050024.