MIND-WARPING: towards creating a compelling collaborative augmented reality game
Proceedings of the 5th international conference on Intelligent user interfaces
Recent Advances in Augmented Reality
IEEE Computer Graphics and Applications
Marker Tracking and HMD Calibration for a Video-Based Augmented Reality Conferencing System
IWAR '99 Proceedings of the 2nd IEEE and ACM International Workshop on Augmented Reality
Robust Real-Time Face Detection
International Journal of Computer Vision
Privacy management for portable recording devices
Proceedings of the 2004 ACM workshop on Privacy in the electronic society
Face to Face Collaborative AR on Mobile Phones
ISMAR '05 Proceedings of the 4th IEEE/ACM International Symposium on Mixed and Augmented Reality
Robust composition: towards a unified approach to access control and concurrency control
Robust composition: towards a unified approach to access control and concurrency control
A survey of mobile and wireless technologies for augmented reality systems
Computer Animation and Virtual Worlds
A head-mounted three dimensional display
AFIPS '68 (Fall, part I) Proceedings of the December 9-11, 1968, fall joint computer conference, part I
Human Machine Interaction
Trends in augmented reality tracking, interaction and display: A review of ten years of ISMAR
ISMAR '08 Proceedings of the 7th IEEE/ACM International Symposium on Mixed and Augmented Reality
Tempest in a Teapot: Compromising Reflections Revisited
SP '09 Proceedings of the 2009 30th IEEE Symposium on Security and Privacy
Enabling always-available input with muscle-computer interfaces
Proceedings of the 22nd annual ACM symposium on User interface software and technology
IEEE Spectrum
I am a sensor, and I approve this message
Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications
Implicit authentication for mobile devices
HotSec'09 Proceedings of the 4th USENIX conference on Hot topics in security
iSpy: automatic reconstruction of typed input from compromising reflections
Proceedings of the 18th ACM conference on Computer and communications security
Towards massively multi-user augmented reality on handheld devices
PERVASIVE'05 Proceedings of the Third international conference on Pervasive Computing
Preventing camera recording by designing a capture-resistant environment
UbiComp'05 Proceedings of the 7th international conference on Ubiquitous Computing
Sensor tricorder: what does that sensor know about me?
Proceedings of the 12th Workshop on Mobile Computing Systems and Applications
User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems
SP '12 Proceedings of the 2012 IEEE Symposium on Security and Privacy
Progressive authentication: deciding when to authenticate on mobile phones
Security'12 Proceedings of the 21st USENIX conference on Security symposium
Operating system support for augmented reality applications
HotOS'13 Proceedings of the 14th USENIX conference on Hot Topics in Operating Systems
Hi-index | 48.22 |
AR systems pose potential security concerns that should be addressed before the systems become widespread.