“Comparison on Various User Authentication Protocols Against Password Stealing And Reuse Attacks”. International Journal of Engineering and Computer Science 3, no. 03 (March 28, 2014). Accessed December 5, 2025. http://www.ijecs.in/index.php/ijecs/article/view/235.