Research Article

Weak PassPoint Passwords Detected by the Perimeter of Delaunay Triangles

Figure 10

Pattern with default shape w, which also follows a clustering pattern (a), the pattern on with default shape (soft) but is detected as random (b), and pattern on with default shape Z, which also follows a regularity pattern (c).
(a)
(b)
(c)