Return to Article Details MODELING THE PROCESS OF TWO-FACTOR AUTHENTICATION Download Download PDF