Return to Article Details A General Approach of Authentication Scheme and its Comparative Study Download Download PDF