Evaluating the Usability of Two-Factor Authentication