Return to Article Details Design and Security Analysis of Authentication Scheme using 3-D Virtual Environment Download Download PDF