Author:Vorster, J; Van Heerden, Renier PDate:Mar 2015Graphical passwords schemas are becoming more main-stream. There are many different approaches to graphical passwords, each with its own drawbacks and advantages. There has been many studies to suggest that graphical passwords should be ...Read more
Author:Peach, S; Vorster, J; Van Heerden, Renier PDate:May 2010In this paper the authors explore heuristic attacks against graphical password generators. A new trend is emerging to use user clickable pictures to generate passwords. This technique of authentication can be successfully used for - for example ...Read more
Author:Vorster, JS; Van Heerden, Renier P; Irwin, BDate:Aug 2016Conventional (text-based) passwords have shown patterns such as variations on the username, or known passwords such as ”password”, ”admin” or ”12345”. Patterns may similarly be detected in the use of Graphical passwords (GPs). The most ...Read more
Author:Vorster, JS; Van Heerden, Renier PDate:Oct 2015Depending on the graphical password schema, the key-space can be even bigger than alpha-numeric passwords. However, in conventional passwords, users will re-use letters within a password. This study investigates graphical passwords for ...Read more
Author:Vorster, J; Irwin, B; Van Heerden, Renier PDate:Mar 2018During the past decade, the sophistication and maturity of Enterprise-level Information Security (EIS) Standards and Systems has increased significantly. This maturity, particularly in the handling of enterprise-wide capability models, has ...Read more