1.
Protecting User Authentication with Visual Cryptography Against Phishing Attacks. JRTCSE. 2013;1(2):11-19. Accessed September 20, 2024. https://jrtcse.com/index.php/home/article/view/JRTCSE.2013.2.2