Return to Article Details Factorizing Analysis of Two Factor Authentication Techniques for Rapid and Secure Communication Download Download PDF