[1]
Borovikov Evgeny, “Two-factor Authentication through Flash Calls: Technical and Economic Analysis”, IJC, vol. 53, no. 1, pp. 173–180, Dec. 2024, Accessed: Jan. 10, 2026. [Online]. Available: https://ijcjournal.org/InternationalJournalOfComputer/article/view/2351