Two-factor Authentication Scheme Research Articles