Impersonation attacks on software-only two-factor authentication schemes | IEEE Journals & Magazine | IEEE Xplore