ResearchSpace
Search
Login
All of ResearchSpace
Research Outputs
CSIR Publications
Archives Collection
Datasets
Search
JavaScript is disabled for your browser. Some features of this site may not work without it.
ResearchSpace
→
Search
Search
Search:
All of ResearchSpace
Archives collection
CSIR Publications
Datasets
Research Publications/Outputs
Filters
Use filters to refine the search results.
Current Filters:
Title
Author
Subject
xmlui.ArtifactBrowser.SimpleSearch.filter.Publication_Type
Date issued
Contains
Equals
ID
Not Contains
Not Equals
Not ID
New Filters:
Title
Author
Subject
xmlui.ArtifactBrowser.SimpleSearch.filter.Publication_Type
Date issued
Contains
Equals
ID
Not Contains
Not Equals
Not ID
Showing 5 out of a total of 5 results.
(0.007 seconds)
Now showing items 1-5 of 5
1
Sort Options:
Relevance
Title Asc
Title Desc
Issue Date Asc
Issue Date Desc
Results Per Page:
5
10
20
40
60
80
100
The pattern-richness of graphical passwords
Vorster, JS
;
Van Heerden, Renier P
;
Irwin, B
(
IEEE
,
2016-08
)
Violations of good security practices in graphical passwords schemes: Enterprise constraints on scheme-design
Vorster, J
;
Irwin, B
;
Van Heerden, Renier P
(
Academic Conferences and Publishing International
,
2018-03
)
Heuristic attacks against graphical password generators
Peach, S
;
Vorster, J
;
Van Heerden, Renier P
(
2010-05
)
A study of perceptions of graphical passwords
Vorster, JS
;
Van Heerden, Renier P
(
Peregrine Technical Solutions
,
2015-10
)
Graphical passwords: a qualitative study of password patterns
Vorster, J
;
Van Heerden, Renier P
(
2015-03
)
Now showing items 1-5 of 5
1
Sort Options:
Relevance
Title Asc
Title Desc
Issue Date Asc
Issue Date Desc
Results Per Page:
5
10
20
40
60
80
100
masked
Browse
All of ResearchSpace
Communities & Collections
By Issue Date
Authors
Titles
Subjects
Publication Type
Cluster
Impact Area
Discover
Author
Van Heerden, Renier P (5)
Vorster, J (3)
Irwin, B (2)
Vorster, JS (2)
Peach, S (1)
Subject
Graphical passwords (5)
Access management (3)
Information security (2)
Password patterns (2)
Graphical password generator (1)
Heuristic attacks (1)
Heuristic password attack (1)
Information security management system (1)
Password cracking (1)
User authentication (1)
... View More
Date Issued
2015 (2)
2010 (1)
2016 (1)
2018 (1)
Publication Type
Conference Presentation (5)
Back to top