“Protecting User Authentication with Visual Cryptography Against Phishing Attacks” (2013) JOURNAL OF RECENT TRENDS IN COMPUTER SCIENCE AND ENGINEERING ( JRTCSE), 1(2), pp. 11–19. Available at: https://jrtcse.com/index.php/home/article/view/JRTCSE.2013.2.2 (Accessed: 20 September 2024).