Fig. 3From: Role of authentication factors in Fin-tech mobile transaction securityYear-wise number of downloaded relevant publicationsBack to article page