Research Article

An Alternative Method for Understanding User-Chosen Passwords

Figure 1

Construction phases.