1.
Ooi Yee Hui D, Kian Yuen K, Asha Farina Binti Shikh Mohd Zahor B, Lim Ching Wei K, Fitri Zaaba Z, Rajab Asaad R. Evolution of User Authentication Methods in Mobile Phones: A Security Perspective. IJET [Internet]. 2018 Nov. 27 [cited 2024 Apr. 29];7(4.19):425-9. Available from: https://www.sciencepubco.com/index.php/ijet/article/view/23177