1.
Protecting User Authentication with Visual Cryptography Against Phishing Attacks. JRTCSE [Internet]. 2013 Aug. 3 [cited 2024 Sep. 20];1(2):11-9. Available from: https://jrtcse.com/index.php/home/article/view/JRTCSE.2013.2.2