Return to Article Details Security: hash function-authentications Download Download PDF