Return to Article Details Security protocol for a remote user authentication system over unsecure network Download Download PDF