Article Comments

Contributions from readers on our articles are very welcome. This form will let us retrieve the current data in the database and allows us to consider your comments.

Secured approach for authentication using threshold-based hierarchical visual cryptography
Pallavi Vijay Chavan; Mohammad Atique
International Journal of Information Privacy, Security and Integrity (IJIPSI), 2015 Vol.2 No.2, pp.159 - 175
1 + 16 =

Thank you for your feedback.