메뉴 건너뛰기




Volumn , Issue , 2015, Pages 743-753

No escape from reality: Security and privacy of augmented reality browsers

Author keywords

[No Author keywords available]

Indexed keywords

AUGMENTED REALITY; MOBILE DEVICES; MOBILE TELECOMMUNICATION SYSTEMS;

EID: 84968784388     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2736277.2741657     Document Type: Conference Paper
Times cited : (28)

References (31)
  • 8
    • 84900557506 scopus 로고    scopus 로고
    • A touring machine: Prototyping 3D mobile augmented reality systems for exploring the urban environment
    • S. Feiner, B. MacIntyre, T. Höllerer, and A. Webster. A touring machine: Prototyping 3D mobile augmented reality systems for exploring the urban environment. Personal Technologies, 1(4), 1997.
    • (1997) Personal Technologies , vol.1 , pp. 4
    • Feiner, S.1    MacIntyre, B.2    Höllerer, T.3    Webster, A.4
  • 9
    • 85180405445 scopus 로고    scopus 로고
    • Breaking and fixing origin-based access control in hybrid Web/mobile application frameworks
    • M. Georgiev, S. Jana, and V. Shmatikov. Breaking and fixing origin-based access control in hybrid Web/mobile application frameworks. In NDSS, 2014.
    • (2014) NDSS
    • Georgiev, M.1    Jana, S.2    Shmatikov, V.3
  • 10
    • 84973894897 scopus 로고    scopus 로고
    • Location privacy revisited: Factors of privacy decisions
    • B. Henne, M. Harbach, and M. Smith. Location privacy revisited: Factors of privacy decisions. In CHI, 2013.
    • (2013) CHI
    • Henne, B.1    Harbach, M.2    Smith, M.3
  • 13
    • 84881254099 scopus 로고    scopus 로고
    • A scanner Darkly: Protecting user privacy from perceptual applications
    • S. Jana, A. Narayanan, and V. Shmatikov. A scanner Darkly: Protecting user privacy from perceptual applications. In S&P, 2013.
    • (2013) S&P
    • Jana, S.1    Narayanan, A.2    Shmatikov, V.3
  • 14
    • 84968873934 scopus 로고    scopus 로고
    • Become a Junaio developer. http://www.slideshare.net/metaio-AR/why-Tobecome-A-junaio-developer, 2013.
    • (2013) Become A Junaio Developer
  • 16
    • 0842289997 scopus 로고    scopus 로고
    • Browsing the real-world wide web: Maintaining awareness of virtual information in an AR information space
    • R. Kooper and B. B. MacIntyre. Browsing the real-world wide web: Maintaining awareness of virtual information in an AR information space. International Journal of Human-Computer Interaction, 16(3), 2003.
    • (2003) International Journal of Human-Computer Interaction , vol.16 , pp. 3
    • Kooper, R.1    MacIntyre, B.B.2
  • 18
  • 19
    • 84887446351 scopus 로고    scopus 로고
    • OGC augmented reality markup language 2.0 (ARML 2.0) [candidate standard]
    • Open Geospatial Consortium. OGC augmented reality markup language 2.0 (ARML 2.0) [candidate standard]. http://www.opengeospatial.org/projects/groups/arml2.0swg, 2013.
    • (2013) Open Geospatial Consortium
  • 23
    • 84897010648 scopus 로고    scopus 로고
    • Security and privacy for augmented reality systems
    • F. Roesner, T. Kohno, and D. Molnar. Security and privacy for augmented reality systems. In Communications of the ACM, volume 57, pages 88-96, 2014.
    • (2014) Communications of the ACM , vol.57 , pp. 88-96
    • Roesner, F.1    Kohno, T.2    Molnar, D.3
  • 24
    • 84860851097 scopus 로고    scopus 로고
    • Framing attacks on smart phones and dumb routers: Tap-jacking and geo-localization
    • G. Rydstedt, E. Bursztein, and D. Boneh. Framing attacks on smart phones and dumb routers: Tap-jacking and geo-localization. In WOOT, 2010.
    • (2010) WOOT
    • Rydstedt, G.1    Bursztein, E.2    Boneh, D.3
  • 25
    • 80755172908 scopus 로고    scopus 로고
    • Busting frame busting: A study of clickjacking vulnerabilities at popular sites
    • G. Rydstedt, E. Bursztein, D. Boneh, and C. Jackson. Busting frame busting: A study of clickjacking vulnerabilities at popular sites. In W2SP, 2010.
    • (2010) W2SP
    • Rydstedt, G.1    Bursztein, E.2    Boneh, D.3    Jackson, C.4
  • 26
    • 85180405215 scopus 로고    scopus 로고
    • The postman always rings twice: Attacking and defending postMessage in HTML5 websites
    • S. Son and V. Shmatikov. The postman always rings twice: Attacking and defending postMessage in HTML5 websites. In NDSS, 2013.
    • (2013) NDSS
    • Son, S.1    Shmatikov, V.2
  • 27
    • 41149151731 scopus 로고    scopus 로고
    • Same origin policy. http://www.w3.org/Security/wiki/Same-Origin-Policy.
    • Same Origin Policy
  • 28
    • 0033364890 scopus 로고    scopus 로고
    • Information in places
    • J. Spohrer. Information in places. IBM Systems Journal, 38(4):602-628, 1999.
    • (1999) IBM Systems Journal , vol.38 , Issue.4 , pp. 602-628
    • Spohrer, J.1
  • 29
    • 84968787729 scopus 로고    scopus 로고
    • Wikitude for agencies. http://www.slideshare.net/wikitude/wikitudemedia-portfolio-presentation, 2012.
    • (2012) Wikitude for Agencies
  • 30
    • 70450164332 scopus 로고    scopus 로고
    • Bundling features for large scale partial-duplicate web image search
    • Z. Wu, Q. Ke, M. Isard, and J. Sun. Bundling features for large scale partial-duplicate web image search. In CVPR, 2009.
    • (2009) CVPR
    • Wu, Z.1    Ke, Q.2    Isard, M.3    Sun, J.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.