The pattern-richness of graphical passwords

JS Vorster, RP Van Heerden… - 2016 Information Security …, 2016 - ieeexplore.ieee.org
Conventional (text-based) passwords have shown patterns such as variations on the
username, or known passwords such as “password”,“admin” or “12345”. Patterns may …

Graphical passwords: a qualitative study of password patterns

J Vorster, R van Heerden - The Proceedings of the 10th …, 2015 - books.google.com
Graphical passwords schemas are becoming more main-stream. There are many different
approaches to graphical passwords, each with its own drawbacks and advantages. There …

[PDF][PDF] A framework for the implementation of graphical passwords

JS Vorster - 2014 - researchgate.net
Graphical passwords have emerged over the past decade as a technology that may change
the way we authenticate to systems; it is a potential technology to replace typing passwords …

The effectiveness of intersection attack countermeasures for graphical passwords

R English, R Poet - 2012 IEEE 11th International Conference on …, 2012 - ieeexplore.ieee.org
Recognition-based graphical passwords are one of several proposed alternatives to
alphanumerical passwords for user authentication. However, there has been limited work on …

Challenge set designs and user guidelines for usable and secured recognition-based graphical passwords

HM Aljahdali, R Poet - … on Trust, Security and Privacy in …, 2014 - ieeexplore.ieee.org
Graphical passwords are a promising alternative to alphanumeric passwords for user
authentication. Recognition-based schemes are commonly used. This paper aims to find the …

Towards secure design choices for implementing graphical passwords

J Thorpe, PC Van Oorschot - 20th Annual Computer Security …, 2004 - ieeexplore.ieee.org
We study the impact of selected parameters on the size of the password space for" Draw-A-
Secret"(DAS) graphical passwords. We examine the role of and relationships between the …

Visualizing keyboard pattern passwords

D Schweitzer, J Boleng, C Hughes… - Information …, 2011 - journals.sagepub.com
Passwords are fundamental security vulnerabilities in many systems. Several researchers
have investigated the trade-off between password memorability versus resiliency to cracking …

Heuristic Attacks against graphical password generators

S Peach, J Voster, RV Heerden - Proceedings of the South …, 2010 - books.google.com
In this paper we explore heuristic attacks against graphical password generators. A new
trend is emerging to use user clickable pictures to generate passwords. This technique of …

The affect of familiarity on the usability of recognition-based graphical passwords: Cross cultural study between saudi arabia and the united kingdom

HM Aljahdali, R Poet - … on Trust, Security and Privacy in …, 2013 - ieeexplore.ieee.org
Recognition-based graphical password have been proposed as an alternative to overcome
the drawbacks of the alphanumeric password in user authentication. A web-based study …

Effectiveness of Some Tests of Spatial Randomness in the Detection of Weak Graphical Passwords in Passpoint

JA Herrera-Macías, L Suárez-Plasencia… - … on Computer Science …, 2020 - Springer
This paper explores the usability of the Ripley's K function and the nearest neighbor
distance, in the detection of clustered graphical passwords in the graphical authentication …