GENERAL ENQUIRIES: Tel: + 27 12 841 2911 | Email: callcentre@csir.co.za

Browsing by Author "Vorster, JS"

Sort by: Order: Results:

  • Senekal, FP; Vorster, JS (2007-07)
    A large computer network such as the Internet contains millions of computers, services and users, interconnected in a complicated and ever changing web. This article provides an introduction to network mapping and usage ...
  • Vorster, JS; Van Heerden, Renier P; Irwin, B (IEEE, 2016-08)
    Conventional (text-based) passwords have shown patterns such as variations on the username, or known passwords such as ”password”, ”admin” or ”12345”. Patterns may similarly be detected in the use of Graphical passwords ...
  • Van Heerden, RP; Vorster, JS (2009-03)
    The use of passwords has become endemic in everyday life, and passwords have penetrated most aspects of modern life. The purpose of this paper was to investigate the types of information that can be deduced from password ...
  • Vorster, JS; Van Heerden, Renier P (Peregrine Technical Solutions, 2015-10)
    Depending on the graphical password schema, the key-space can be even bigger than alpha-numeric passwords. However, in conventional passwords, users will re-use letters within a password. This study investigates graphical ...