-
1
-
-
0031246031
-
Cyberguide: A mobile context-Aware tour guide
-
G. Abowd, C. Atkeson, J. Hong, S. Long, R. Kooper, and M. Pinkerton. Cyberguide: A mobile context-Aware tour guide. Wireless Networks, 3(5), 1997.
-
(1997)
Wireless Networks
, vol.3
, pp. 5
-
-
Abowd, G.1
Atkeson, C.2
Hong, J.3
Long, S.4
Kooper, R.5
Pinkerton, M.6
-
3
-
-
0035503402
-
-
R. T. Azuma, Y. Baillot, R. Behringer, S. Feiner, S. Julier, and B. MacIntyre. Recent advances in augmented reality.computer Graphics and Applications, 21(6):34-47, 2001.
-
(2001)
Recent Advances in Augmented Reality.computer Graphics and Applications
, vol.21
, Issue.6
, pp. 34-47
-
-
Azuma, R.T.1
Baillot, Y.2
Behringer, R.3
Feiner, S.4
Julier, S.5
MacIntyre, B.6
-
6
-
-
85092792940
-
Operating system support for augmented reality applications
-
L. DAntoni, A. Dunn, S. Jana, T. Kohno, B. Livshits, D. Molnar, A. Moshchuk, E. Ofek, F. Roesner, S. Saponas, M. Veanes, and H. J. Wang. Operating system support for augmented reality applications. In HotOS, 2013.
-
(2013)
HotOS
-
-
DAntoni, L.1
Dunn, A.2
Jana, S.3
Kohno, T.4
Livshits, B.5
Molnar, D.6
Moshchuk, A.7
Ofek, E.8
Roesner, F.9
Saponas, S.10
Veanes, M.11
Wang, H.J.12
-
8
-
-
84900557506
-
A touring machine: Prototyping 3D mobile augmented reality systems for exploring the urban environment
-
S. Feiner, B. MacIntyre, T. Höllerer, and A. Webster. A touring machine: Prototyping 3D mobile augmented reality systems for exploring the urban environment. Personal Technologies, 1(4), 1997.
-
(1997)
Personal Technologies
, vol.1
, pp. 4
-
-
Feiner, S.1
MacIntyre, B.2
Höllerer, T.3
Webster, A.4
-
9
-
-
85180405445
-
Breaking and fixing origin-based access control in hybrid Web/mobile application frameworks
-
M. Georgiev, S. Jana, and V. Shmatikov. Breaking and fixing origin-based access control in hybrid Web/mobile application frameworks. In NDSS, 2014.
-
(2014)
NDSS
-
-
Georgiev, M.1
Jana, S.2
Shmatikov, V.3
-
10
-
-
84973894897
-
Location privacy revisited: Factors of privacy decisions
-
B. Henne, M. Harbach, and M. Smith. Location privacy revisited: Factors of privacy decisions. In CHI, 2013.
-
(2013)
CHI
-
-
Henne, B.1
Harbach, M.2
Smith, M.3
-
11
-
-
84940382117
-
Clickjacking: Attacks and defenses
-
L.-S. Huang, A. Moshchuk, H. J. Wang, S. Schechter, and C. Jackson. Clickjacking: Attacks and defenses. In USENIX Security, 2012.
-
(2012)
USENIX Security
-
-
Huang, L.-S.1
Moshchuk, A.2
Wang, H.J.3
Schechter, S.4
Jackson, C.5
-
12
-
-
84910668443
-
Enabling fine-grained permissions for augmented reality applications with recognizers
-
S. Jana, D. Molnar, A. Moshchuk, A. Dunn, B. Livshits, H. J. Wang, and E. Ofek. Enabling fine-grained permissions for augmented reality applications with recognizers. In USENIX Security, 2013.
-
(2013)
USENIX Security
-
-
Jana, S.1
Molnar, D.2
Moshchuk, A.3
Dunn, A.4
Livshits, B.5
Wang, H.J.6
Ofek, E.7
-
13
-
-
84881254099
-
A scanner Darkly: Protecting user privacy from perceptual applications
-
S. Jana, A. Narayanan, and V. Shmatikov. A scanner Darkly: Protecting user privacy from perceptual applications. In S&P, 2013.
-
(2013)
S&P
-
-
Jana, S.1
Narayanan, A.2
Shmatikov, V.3
-
14
-
-
84968873934
-
-
Become a Junaio developer. http://www.slideshare.net/metaio-AR/why-Tobecome-A-junaio-developer, 2013.
-
(2013)
Become A Junaio Developer
-
-
-
15
-
-
84912101337
-
Optical delusions: A study of malicious QR codes in the wild
-
A. Kharraz, E. Kirda, W. Robertson, D. Balzarotti, and A. Francillon. Optical delusions: A study of malicious QR codes in the wild. In DSN, 2014.
-
(2014)
DSN
-
-
Kharraz, A.1
Kirda, E.2
Robertson, W.3
Balzarotti, D.4
Francillon, A.5
-
16
-
-
0842289997
-
Browsing the real-world wide web: Maintaining awareness of virtual information in an AR information space
-
R. Kooper and B. B. MacIntyre. Browsing the real-world wide web: Maintaining awareness of virtual information in an AR information space. International Journal of Human-Computer Interaction, 16(3), 2003.
-
(2003)
International Journal of Human-Computer Interaction
, vol.16
, pp. 3
-
-
Kooper, R.1
MacIntyre, B.B.2
-
17
-
-
84968873895
-
QR code security: A survey of attacks and challenges for usable security
-
K. Krombholz, P. Fröhwirt, P. Kieseberg, I. Kapsalis, M. Huber, and E. Weippl. QR code security: A survey of attacks and challenges for usable security. In HCI, 2014.
-
(2014)
HCI
-
-
Krombholz, K.1
Fröhwirt, P.2
Kieseberg, P.3
Kapsalis, I.4
Huber, M.5
Weippl, E.6
-
18
-
-
84968802110
-
-
Layar introduction for developers. http://www.slideshare.net/layarmobile/layarintroduction-for-developers, 2011.
-
(2011)
Layar Introduction for Developers
-
-
-
19
-
-
84887446351
-
-
OGC augmented reality markup language 2.0 (ARML 2.0) [candidate standard]
-
Open Geospatial Consortium. OGC augmented reality markup language 2.0 (ARML 2.0) [candidate standard]. http://www.opengeospatial.org/projects/groups/arml2.0swg, 2013.
-
(2013)
Open Geospatial Consortium
-
-
-
22
-
-
84968880272
-
Augmented reality: Hard problems of law and policy
-
F. Roesner, T. Kohno, T. Denning, R. Calo, and B. C. Newell. Augmented reality: Hard problems of law and policy. In UPSIDE, 2014.
-
(2014)
UPSIDE
-
-
Roesner, F.1
Kohno, T.2
Denning, T.3
Calo, R.4
Newell, B.C.5
-
23
-
-
84897010648
-
Security and privacy for augmented reality systems
-
F. Roesner, T. Kohno, and D. Molnar. Security and privacy for augmented reality systems. In Communications of the ACM, volume 57, pages 88-96, 2014.
-
(2014)
Communications of the ACM
, vol.57
, pp. 88-96
-
-
Roesner, F.1
Kohno, T.2
Molnar, D.3
-
24
-
-
84860851097
-
Framing attacks on smart phones and dumb routers: Tap-jacking and geo-localization
-
G. Rydstedt, E. Bursztein, and D. Boneh. Framing attacks on smart phones and dumb routers: Tap-jacking and geo-localization. In WOOT, 2010.
-
(2010)
WOOT
-
-
Rydstedt, G.1
Bursztein, E.2
Boneh, D.3
-
25
-
-
80755172908
-
Busting frame busting: A study of clickjacking vulnerabilities at popular sites
-
G. Rydstedt, E. Bursztein, D. Boneh, and C. Jackson. Busting frame busting: A study of clickjacking vulnerabilities at popular sites. In W2SP, 2010.
-
(2010)
W2SP
-
-
Rydstedt, G.1
Bursztein, E.2
Boneh, D.3
Jackson, C.4
-
26
-
-
85180405215
-
The postman always rings twice: Attacking and defending postMessage in HTML5 websites
-
S. Son and V. Shmatikov. The postman always rings twice: Attacking and defending postMessage in HTML5 websites. In NDSS, 2013.
-
(2013)
NDSS
-
-
Son, S.1
Shmatikov, V.2
-
27
-
-
41149151731
-
-
Same origin policy. http://www.w3.org/Security/wiki/Same-Origin-Policy.
-
Same Origin Policy
-
-
-
28
-
-
0033364890
-
Information in places
-
J. Spohrer. Information in places. IBM Systems Journal, 38(4):602-628, 1999.
-
(1999)
IBM Systems Journal
, vol.38
, Issue.4
, pp. 602-628
-
-
Spohrer, J.1
-
29
-
-
84968787729
-
-
Wikitude for agencies. http://www.slideshare.net/wikitude/wikitudemedia-portfolio-presentation, 2012.
-
(2012)
Wikitude for Agencies
-
-
-
30
-
-
70450164332
-
Bundling features for large scale partial-duplicate web image search
-
Z. Wu, Q. Ke, M. Isard, and J. Sun. Bundling features for large scale partial-duplicate web image search. In CVPR, 2009.
-
(2009)
CVPR
-
-
Wu, Z.1
Ke, Q.2
Isard, M.3
Sun, J.4
|