Author:Vorster, J; Van Heerden, Renier PDate:Mar 2015Graphical passwords schemas are becoming more main-stream. There are many different approaches to graphical passwords, each with its own drawbacks and advantages. There has been many studies to suggest that graphical passwords should be ...Read more
Author:Vorster, JS; Van Heerden, Renier PDate:Oct 2015Depending on the graphical password schema, the key-space can be even bigger than alpha-numeric passwords. However, in conventional passwords, users will re-use letters within a password. This study investigates graphical passwords for ...Read more
Author:Vorster, J; Irwin, B; Van Heerden, Renier PDate:Mar 2018During the past decade, the sophistication and maturity of Enterprise-level Information Security (EIS) Standards and Systems has increased significantly. This maturity, particularly in the handling of enterprise-wide capability models, has ...Read more