[1]
2014. Comparison on Various User Authentication Protocols Against Password Stealing And Reuse Attacks.
International Journal of Engineering and Computer Science
. 3, 03 (Mar. 2014).