[1]
Borovikov Evgeny, “Two-factor Authentication through Flash Calls: Technical and Economic Analysis”, IJC, vol. 53, no. 1, pp. 173–180, Dec. 2024, Accessed: Nov. 03, 2025. [Online]. Available: https://ijcjournal.org/InternationalJournalOfComputer/article/view/2351