4.6 Article

Immersive Virtual Reality Attacks and the Human Joystick

Related references

Note: Only part of the references are listed.
Proceedings Paper Computer Science, Information Systems

Securing Augmented Reality Output

Kiron Lebeck et al.

2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2017)

Proceedings Paper Computer Science, Information Systems

How to Safely Augment Reality: Challenges and Directions

Kiron Lebeck et al.

HOTMOBILE'16: PROCEEDINGS OF THE 17TH INTERNATIONAL WORKSHOP ON MOBILE COMPUTING SYSTEMS AND APPLICATIONS (2016)

Proceedings Paper Computer Science, Hardware & Architecture

Looks Good To Me: Authentication for Augmented Reality

Ethan Gaebel et al.

TRUSTED'16: PROCEEDINGS OF THE INTERNATIONAL WORKSHOP ON TRUSTWORTHY EMBEDDED DEVICES (2016)

Proceedings Paper Computer Science, Software Engineering

Candid Interaction: Revealing Hidden Mobile and Wearable Computing Activities

Barrett Ens et al.

UIST'15: PROCEEDINGS OF THE 28TH ANNUAL ACM SYMPOSIUM ON USER INTERFACE SOFTWARE AND TECHNOLOGY (2015)

Proceedings Paper Computer Science, Information Systems

Visual Cryptography and Obfuscation: A Use-Case for Decrypting and Deobfuscating Information Using Augmented Reality

Patrik Lantz et al.

FINANCIAL CRYPTOGRAPHY AND DATA SECURITY (FC 2015) (2015)

Review Computer Science, Hardware & Architecture

Security and Privacy for Augmented Reality Systems

Franziska Roesner et al.

COMMUNICATIONS OF THE ACM (2014)

Article Computer Science, Information Systems

Man-in-the-Middle Attack to the HTTPS Protocol

Franco Callegati et al.

IEEE SECURITY & PRIVACY (2009)

Article Psychology, Applied

Virtual reality: an experiential tool for clinical psychology

Giuseppe Riva

BRITISH JOURNAL OF GUIDANCE & COUNSELLING (2009)

Review Neurosciences

From presence to consciousness through virtual reality

MV Sanchez-Vives et al.

NATURE REVIEWS NEUROSCIENCE (2005)