Return to Article Details Software Tokens Based Two Factor Authentication Scheme Download Download PDF