authentication two factor authentication live internet security encryption one time password fraud microsoft .net authentication identity 2.0 identity authentication strong authentication man-in-the-middle attack fraud reduction land attack polygraph marketing research security logic bombs