Violations of good security practices in graphical passwords schemes: Enterprise constraints on scheme-design

- Vorster, Johannes, Irwin, Barry V W, van Heerden, Renier P