[1]
S. P. Evseev and B. P. Tomashevskyy, “TWO-FACTOR AUTHENTICATION METHODS THREATS ANALYSIS”, RIC, no. 1, Jun. 2015.