No security by obscurity - why two factor authentication should be based on an open design | IEEE Conference Publication | IEEE Xplore