[1]
T. N. Ghorsad and R. S. Pippal, “A REVIEW ON SCHEMES FOR USER AUTHENTICATION”,
cse
, vol. 1, no. 3, pp. 98-103, May 2015.