“Comparison on Various User Authentication Protocols Against Password Stealing And Reuse Attacks”.
International Journal of Engineering and Computer Science
, vol. 3, no. 03, Mar. 2014,
http://ijecs.in/index.php/ijecs/article/view/235
.