[1]
“Protecting User Authentication with Visual Cryptography Against Phishing Attacks”, JRTCSE, vol. 1, no. 2, pp. 11–19, Aug. 2013, Accessed: Sep. 20, 2024. [Online]. Available: https://jrtcse.com/index.php/home/article/view/JRTCSE.2013.2.2