Research Article

Weak PassPoint Passwords Detected by the Perimeter of Delaunay Triangles

Figure 1

Random point pattern: (a) regular (b) and clustered (c).
(a)
(b)
(c)