1 Scope
2 References
3 Definitions
3.1 Terms defined elsewhere
3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Overview of multi-factor authentication
6.1 Single-factor authentication
6.2 Two-factor authentication
6.3 Multi-factor authentication
6.4 Combination of multi-factor authentication
6.5 Authentication threats
6.6 Criteria for selecting a multi-factor authentication method
6.7 Features of multi-factor authentication mechanisms using a
mobile device
7 Security requirements for multi-factor authentication
7.1 General
7.2 Mobile device
7.3 Secure element
7.4 Service provider
8 Generic mechanisms
8.1 Entities
8.2 Operations
8.3 Authentication models
8.4 Protocols
Appendix I – Typical scenario for two-factor authentication
Appendix II – Instances of components of multi-factor authentication
II.1 Smart-card
II.2 Digital certificate
II.3 Biometrics
Bibliography