Research Article

Weak PassPoint Passwords Detected by the Perimeter of Delaunay Triangles

Figure 2

Representation of a Voronoi diagram (VD) and its corresponding Delaunay triangulation (DT).