!--Security is strengthened by employing a PBKDF2 key derivation function.However, the weak passphrases users typically employ are vulnerable to password cracking attack.
By using the result of the scalarization of the weak efficient solutions set, a result of the connectedness of the weak efficient solution sets is obtained in topological vector space.