[1]
Singh, S. 2016. Security: hash function-authentications. International research journal of engineering, IT & scientific research. 2, 3 (Mar. 2016), 16–32.