Return to Article Details A Secure Two Factor Authentication Scheme with End to End Decryption Download Download PDF