Text this: Formal analysis and systematic construction of two-factor authentication scheme

 _    _     _____      _____   _    _    __   __  
| \  / ||  |  ___||   / ___// | || | ||  \ \\/ // 
|  \/  ||  | ||__     \___ \\ | || | ||   \   //  
| .  . ||  | ||__     /    // | \\_/ ||   / . \\  
|_|\/|_||  |_____||  /____//   \____//   /_//\_\\ 
`-`  `-`   `-----`  `-----`     `---`    `-`  --`