-
2
-
-
85026985091
-
Experimentation of a new teleassistance system using augmented reality
-
S. Bottecchia, J.-M. Cieutat, J.-P. Jessel, et al., "Experimentation of a new teleassistance system using augmented reality, " LAVAL VIRTUAL VRIC 2010, pp. 163-170, 2010.
-
(2010)
Laval Virtual Vric 2010
, pp. 163-170
-
-
Bottecchia, S.1
Cieutat, J.-M.2
Jessel, J.-P.3
-
3
-
-
84897010648
-
Security and privacy for augmented reality systems
-
F. Roesner, T. Kohno, and D. Molnar, "Security and privacy for augmented reality systems, " Communications of the ACM, vol. 57, no. 4, pp. 88-96, 2014.
-
(2014)
Communications of the ACM
, vol.57
, Issue.4
, pp. 88-96
-
-
Roesner, F.1
Kohno, T.2
Molnar, D.3
-
5
-
-
84908682228
-
Augmented reality: Hard problems of law and policy
-
ACM
-
F. Roesner, T. Kohno, T. Denning, R. Calo, and B. C. Newell, "Augmented reality: hard problems of law and policy, " in Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication, pp. 1283-1288, ACM, 2014.
-
(2014)
Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication
, pp. 1283-1288
-
-
Roesner, F.1
Kohno, T.2
Denning, T.3
Calo, R.4
Newell, B.C.5
-
6
-
-
84908689805
-
Markit: Privacy markers for protecting visual secrets
-
ACM
-
N. Raval, L. Cox, A. Srivastava, A. Machanavajjhala, and K. Lebeck, "Markit: privacy markers for protecting visual secrets, " in Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication, pp. 1289-1295, ACM, 2014.
-
(2014)
Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication
, pp. 1289-1295
-
-
Raval, N.1
Cox, L.2
Srivastava, A.3
Machanavajjhala, A.4
Lebeck, K.5
-
7
-
-
85026992202
-
Enabling fine-grained permissions for augmented reality applications with recognizers
-
S. Jana, D. Molnar, A. Moshchuk, A. M. Dunn, B. Livshits, H. J. Wang, and E. Ofek, "Enabling fine-grained permissions for augmented reality applications with recognizers., " Citeseer.
-
Citeseer
-
-
Jana, S.1
Molnar, D.2
Moshchuk, A.3
Dunn, A.M.4
Livshits, B.5
Wang, H.J.6
Ofek, E.7
-
8
-
-
84906994292
-
Performance evaluation of attribute-based encryption: Toward data privacy in the iot
-
June
-
X. Wang, J. Zhang, E. Schooler, and M. Ion, "Performance evaluation of attribute-based encryption: Toward data privacy in the iot, " in Communications (ICC), 2014 IEEE International Conference on, pp. 725-730, June 2014.
-
(2014)
Communications (ICC), 2014 IEEE International Conference on
, pp. 725-730
-
-
Wang, X.1
Zhang, J.2
Schooler, E.3
Ion, M.4
-
9
-
-
84954119024
-
An improved tracking using imu and vision fusion for mobile augmented reality application
-
V. Ashley, K. Kriti, N. Narendra, R. Pavan K, S. Prashanth, C. Girish, and P. Balamuralidhar, "An improved tracking using imu and vision fusion for mobile augmented reality application, " in The International Journal of Multimedia and its Applications, 2014.
-
(2014)
The International Journal of Multimedia and Its Applications
-
-
Ashley, V.1
Kriti, K.2
Narendra, N.3
Pavan, K.R.4
Prashanth, S.5
Girish, C.6
Balamuralidhar, P.7
-
10
-
-
84988290571
-
Mobicostream: Real-time collaborative video upstream for mobile augmented reality applications
-
N. Narendra, K. Pavan Reddy, V. Ashley, K. Kriti, S. Prashanth, C. Girish, and P. Balamuralidhar, "Mobicostream: Real-time collaborative video upstream for mobile augmented reality applications, " in Advanced Networking and Telecommunication Systems, IEEE, 2014.
-
(2014)
Advanced Networking and Telecommunication Systems, IEEE
-
-
Narendra, N.1
Pavan Reddy, K.2
Ashley, V.3
Kriti, K.4
Prashanth, S.5
Girish, C.6
Balamuralidhar, P.7
-
12
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
ACM
-
V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-based encryption for fine-grained access control of encrypted data, " in Proceedings of the 13th ACM conference on Computer and communications security, pp. 89-98, ACM, 2006.
-
(2006)
Proceedings of the 13th ACM Conference on Computer and Communications Security
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
13
-
-
34548731375
-
Ciphertext-policy attributebased encryption
-
IEEE
-
J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-policy attributebased encryption, " in Security and Privacy, 2007. SP'07. IEEE Symposium on, pp. 321-334, IEEE, 2007.
-
(2007)
Security and Privacy, 2007. SP'07. IEEE Symposium on
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
14
-
-
84924327697
-
Mq telemetry transport (mqtt) v3. 1 protocol specification
-
D. Locke, "Mq telemetry transport (mqtt) v3. 1 protocol specification, " IBM developerWorks Technical Library], available at http://www. ibm. com/developerworks/webservices/library/ws-mqtt/index. html, 2010.
-
(2010)
IBM DeveloperWorks Technical Library
-
-
Locke, D.1
-
15
-
-
84960520104
-
-
Accessed: 2014-12-22
-
"Metaio. " http://www. metaio. com. Accessed: 2014-12-22.
-
-
-
|