Research Article

Password Authentication Based on Fractal Coding Scheme

Figure 4

Comparison between phases in terms of execution time.
340861.fig.004