[1]
T. N. Ghorsad and R. S. Pippal, “A REVIEW ON SCHEMES FOR USER AUTHENTICATION”, cse, vol. 1, no. 3, pp. 98-103, May 2015.