Research Article
Weak PassPoint Passwords Detected by the Perimeter of Delaunay Triangles
Figure 10
Pattern with default shape w, which also follows a clustering pattern (a), the pattern on with default shape (soft) but is detected as random (b), and pattern on with default shape Z, which also follows a regularity pattern (c).
(a) |
(b) |
(c) |