1.
Singh S. Security: hash function-authentications. irjeis [Internet]. 2016 Mar. 31 [cited 2024 Jul. 16];2(3):16-32. Available from: https://sloap.org/journals/index.php/irjeis/article/view/484