[1]
D. Ooi Yee Hui, K. Kian Yuen, B. Asha Farina Binti Shikh Mohd Zahor, K. Lim Ching Wei, Z. Fitri Zaaba, and R. Rajab Asaad, “Evolution of User Authentication Methods in Mobile Phones: A Security Perspective”, IJET, vol. 7, no. 4.19, pp. 425–429, Nov. 2018, doi: 10.14419/ijet.v7i4.19.23177.