[1]
A. G. Lewis, B. Horváth, and R. Costa, “A Comprehensive Review of Quasi-Deterministic Authentication in High-Load Web Systems: Security Models, Optimization Techniques, and Emerging Computing Applications”, Int Journal Adv Comp Theory Engg, vol. 14, no. 2, pp. 230–239, Oct. 2025.