Related references
Note: Only part of the references are listed.Securing Augmented Reality Output
Kiron Lebeck et al.
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2017)
How to Safely Augment Reality: Challenges and Directions
Kiron Lebeck et al.
HOTMOBILE'16: PROCEEDINGS OF THE 17TH INTERNATIONAL WORKSHOP ON MOBILE COMPUTING SYSTEMS AND APPLICATIONS (2016)
Looks Good To Me: Authentication for Augmented Reality
Ethan Gaebel et al.
TRUSTED'16: PROCEEDINGS OF THE INTERNATIONAL WORKSHOP ON TRUSTWORTHY EMBEDDED DEVICES (2016)
Candid Interaction: Revealing Hidden Mobile and Wearable Computing Activities
Barrett Ens et al.
UIST'15: PROCEEDINGS OF THE 28TH ANNUAL ACM SYMPOSIUM ON USER INTERFACE SOFTWARE AND TECHNOLOGY (2015)
Visual Cryptography and Obfuscation: A Use-Case for Decrypting and Deobfuscating Information Using Augmented Reality
Patrik Lantz et al.
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY (FC 2015) (2015)
Security and Privacy for Augmented Reality Systems
Franziska Roesner et al.
COMMUNICATIONS OF THE ACM (2014)
Impact of the motion and visual complexity of the background on players' performance in video game-like displays
Loic Caroux et al.
ERGONOMICS (2013)
Man-in-the-Middle Attack to the HTTPS Protocol
Franco Callegati et al.
IEEE SECURITY & PRIVACY (2009)
Virtual reality: an experiential tool for clinical psychology
Giuseppe Riva
BRITISH JOURNAL OF GUIDANCE & COUNSELLING (2009)
From presence to consciousness through virtual reality
MV Sanchez-Vives et al.
NATURE REVIEWS NEUROSCIENCE (2005)