[1]
“Comparison on Various User Authentication Protocols Against Password Stealing And Reuse Attacks”, int. jour. eng. com. sci, vol. 3, no. 03, Mar. 2014, Accessed: Dec. 05, 2025. [Online]. Available: http://www.ijecs.in/index.php/ijecs/article/view/235