Return to Article Details An Efficient Privacy Preserving Technique Using Decoy Passwords Download Download PDF