Research Article

Weak PassPoint Passwords Detected by the Perimeter of Delaunay Triangles

Figure 5

Delaunay triangulations of clustered points (a), random points (b), and regular points (c).
(a)
(b)
(c)