-
2
-
-
85001578189
-
-
website
-
Magic leap website.
-
Magic Leap
-
-
-
6
-
-
85001706111
-
-
homepage, April
-
Project tango homepage, April 2016.
-
(2016)
Project Tango
-
-
-
8
-
-
35048880921
-
Face Recognition with Local Binary Patterns
-
chapter Springer Berlin Heidelberg, Berlin, Heidelberg
-
T. Ahonen, A. Hadid, and M. Pietikäinen. Computer Vision - ECCV 2004: 8th European Conference on Computer Vision, Prague, Czech Republic, May 11-14, 2004. Proceedings, Part I, chapter Face Recognition with Local Binary Patterns, pages 469-481. Springer Berlin Heidelberg, Berlin, Heidelberg, 2004.
-
(2004)
Computer Vision - ECCV 2004: 8th European Conference on Computer Vision, Prague, Czech Republic, May 11-14, 2004. Proceedings, Part I
, pp. 469-481
-
-
Ahonen, T.1
Hadid, A.2
Pietikäinen, M.3
-
9
-
-
0031185845
-
Eigenfaces vs. fisherfaces: Recognition using class specific linear projection
-
July
-
P. N. Belhumeur, J. a. P. Hespanha, and D. J. Kriegman. Eigenfaces vs. fisherfaces: Recognition using class specific linear projection. IEEE Trans. Pattern Anal. Mach. Intell., 19(7):711-720, July 1997.
-
(1997)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.19
, Issue.7
, pp. 711-720
-
-
Belhumeur, P.N.1
Hespanha, J.A.P.2
Kriegman, D.J.3
-
10
-
-
33745965912
-
Curve25519: New Diffie-Hellman Speed Records
-
chapter Springer Berlin Heidelberg, Berlin, Heidelberg
-
D. J. Bernstein. Public Key Cryptography - PKC 2006, chapter Curve25519: New Diffie-Hellman Speed Records, pages 207-228. Springer Berlin Heidelberg, Berlin, Heidelberg, 2006.
-
(2006)
Public Key Cryptography - PKC 2006
, pp. 207-228
-
-
Bernstein, D.J.1
-
12
-
-
85001775775
-
Integrating face and voice in person perception
-
April
-
S. Campanella and P. Belin. Integrating face and voice in person perception. Trends in Cognitive Sciences, 11(12):543, April 2016.
-
(2016)
Trends in Cognitive Sciences
, vol.11
, Issue.12
, pp. 543
-
-
Campanella, S.1
Belin, P.2
-
13
-
-
34247586702
-
Monoslam: Real-time single camera slam
-
June
-
A. J. Davison, I. D. Reid, N. D. Molton, and O. Stasse. Monoslam: Real-time single camera slam. IEEE Transactions on Pattern Analysis and Machine Intelligence, 29(6):1052-1067, June 2007.
-
(2007)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.29
, Issue.6
, pp. 1052-1067
-
-
Davison, A.J.1
Reid, I.D.2
Molton, N.D.3
Stasse, O.4
-
14
-
-
33745816410
-
Why phishing works
-
New York, NY, USA, ACM
-
R. Dhamija, J. D. Tygar, and M. Hearst. Why phishing works. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '06, pages 581-590, New York, NY, USA, 2006. ACM.
-
(2006)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '06
, pp. 581-590
-
-
Dhamija, R.1
Tygar, J.D.2
Hearst, M.3
-
15
-
-
0017018484
-
New directions in cryptography
-
Sept.
-
W. Diffie and M. Hellman. New directions in cryptography. IEEE Trans. Inf. Theor., 22(6):644-654, Sept. 2006.
-
(2006)
IEEE Trans. Inf. Theor.
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.2
-
17
-
-
80053097824
-
Playful security: A computer game for secure wireless device pairing
-
July
-
A. Gallego, N. Saxena, and J. Voris. Playful security: A computer game for secure wireless device pairing. In Computer Games (CGAMES), 2011 16th International Conference on, pages 177-184, July 2011.
-
(2011)
Computer Games (CGAMES), 2011 16th International Conference on
, pp. 177-184
-
-
Gallego, A.1
Saxena, N.2
Voris, J.3
-
18
-
-
23944521144
-
Manual authentication for wireless devices
-
C. Gehrmann and K. Nyberg. Manual authentication for wireless devices. RSA Cryptobytes, 7:2004, 2004.
-
(2004)
RSA Cryptobytes
, vol.7
, pp. 2004
-
-
Gehrmann, C.1
Nyberg, K.2
-
19
-
-
84907853338
-
Phaser: Enabling phased array signal processing on commodity wifi access points
-
New York, NY, USA, ACM
-
J. Gjengset, J. Xiong, G. McPhillips, and K. Jamieson. Phaser: Enabling phased array signal processing on commodity wifi access points. In Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, MobiCom '14, pages 153-164, New York, NY, USA, 2014. ACM.
-
(2014)
Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, MobiCom '14
, pp. 153-164
-
-
Gjengset, J.1
Xiong, J.2
McPhillips, G.3
Jamieson, K.4
-
20
-
-
84861608109
-
Secure in-band wireless pairing
-
Berkeley, CA, USA, USENIX Association
-
S. Gollakota, N. Ahmed, N. Zeldovich, and D. Katabi. Secure in-band wireless pairing. In Proceedings of the 20th USENIX Conference on Security, SEC'11, pages 16-16, Berkeley, CA, USA, 2011. USENIX Association.
-
(2011)
Proceedings of the 20th USENIX Conference on Security, SEC'11
, pp. 16
-
-
Gollakota, S.1
Ahmed, N.2
Zeldovich, N.3
Katabi, D.4
-
21
-
-
33947635594
-
Loud and clear: Human-verifiable authentication based on audio
-
M. T. Goodrich, M. Sirivianos, J. Solis, G. Tsudik, and E. Uzun. Loud and clear: Human-verifiable authentication based on audio. In 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06), pages 10-10, 2006.
-
(2006)
26th IEEE International Conference on Distributed Computing Systems (ICDCS'06)
, pp. 10
-
-
Goodrich, M.T.1
Sirivianos, M.2
Solis, J.3
Tsudik, G.4
Uzun, E.5
-
23
-
-
79551483702
-
Tool release: Gathering 802.11n traces with channel state information
-
Jan.
-
D. Halperin, W. Hu, A. Sheth, and D. Wetherall. Tool release: Gathering 802.11n traces with channel state information. SIGCOMM Comput. Commun. Rev., 41(1):53-53, Jan. 2011.
-
(2011)
SIGCOMM Comput. Commun. Rev.
, vol.41
, Issue.1
, pp. 53
-
-
Halperin, D.1
Hu, W.2
Sheth, A.3
Wetherall, D.4
-
24
-
-
79955468168
-
Influence of user perception, security needs, and social factors on device pairing method choices
-
New York, NY, USA, ACM
-
I. Ion, M. Langheinrich, P. Kumaraguru, and S. Čapkun. Influence of user perception, security needs, and social factors on device pairing method choices. In Proceedings of the Sixth Symposium on Usable Privacy and Security, SOUPS '10, pages 6:1-6:13, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the Sixth Symposium on Usable Privacy and Security, SOUPS '10
, pp. 6:1-6:13
-
-
Ion, I.1
Langheinrich, M.2
Kumaraguru, P.3
Čapkun, S.4
-
26
-
-
85076704028
-
Pinpoint: Localizing interfering radios
-
Lombard, IL, USENIX
-
K. Joshi, S. Hong, and S. Katti. Pinpoint: Localizing interfering radios. In Presented as part of the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 13), pages 241-253, Lombard, IL, 2013. USENIX.
-
(2013)
10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 13)
, pp. 241-253
-
-
Joshi, K.1
Hong, S.2
Katti, S.3
-
27
-
-
70350716576
-
Usability and security of out-of-band channels in secure device pairing protocols
-
New York, NY, USA, ACM
-
R. Kainda, I. Flechais, and A. W. Roscoe. Usability and security of out-of-band channels in secure device pairing protocols. In Proceedings of the 5th Symposium on Usable Privacy and Security, SOUPS '09, pages 11:1-11:12, New York, NY, USA, 2009. ACM.
-
(2009)
Proceedings of the 5th Symposium on Usable Privacy and Security, SOUPS '09
, pp. 11:1-11:12
-
-
Kainda, R.1
Flechais, I.2
Roscoe, A.W.3
-
29
-
-
4143071294
-
A special-purpose peer-to-peer file sharing system for mobile ad hoc networks
-
Vol.4, Oct
-
A. Klemm, C. Lindemann, and O. P. Waldhorst. A special-purpose peer-to-peer file sharing system for mobile ad hoc networks. In Vehicular Technology Conference, 2003. VTC 2003-Fall. 2003 IEEE 58th, volume 4, pages 2758-2763 Vol.4, Oct 2003.
-
(2003)
Vehicular Technology Conference, 2003. VTC 2003-Fall. 2003 IEEE 58th
, vol.4
, pp. 2758-2763
-
-
Klemm, A.1
Lindemann, C.2
Waldhorst, O.P.3
-
30
-
-
70349332824
-
A comparative study of secure device pairing methods
-
March
-
A. Kumar, N. Saxena, G. Tsudik, and E. Uzun. A comparative study of secure device pairing methods. In Pervasive Computing and Communications, 2009. PerCom 2009. IEEE International Conference on, pages 1-10, March 2009.
-
(2009)
Pervasive Computing and Communications, 2009. PerCom 2009. IEEE International Conference on
, pp. 1-10
-
-
Kumar, A.1
Saxena, N.2
Tsudik, G.3
Uzun, E.4
-
31
-
-
70449686547
-
A comparative study of secure device pairing methods
-
Dec.
-
A. Kumar, N. Saxena, G. Tsudik, and E. Uzun. A comparative study of secure device pairing methods. Pervasive Mob. Comput., 5(6):734-749, Dec. 2009.
-
(2009)
Pervasive Mob. Comput.
, vol.5
, Issue.6
, pp. 734-749
-
-
Kumar, A.1
Saxena, N.2
Tsudik, G.3
Uzun, E.4
-
32
-
-
77956243440
-
Alice meets bob: A comparative usability study of wireless device pairing methods for a "two-user" setting
-
abs/0907.4743
-
A. Kumar, N. Saxena, and E. Uzun. Alice meets bob: A comparative usability study of wireless device pairing methods for a "two-user" setting. CoRR, abs/0907.4743, 2009.
-
(2009)
CoRR
-
-
Kumar, A.1
Saxena, N.2
Uzun, E.3
-
33
-
-
48649107907
-
First experience with cartorrent in a real vehicular ad hoc network testbed
-
May
-
K. C. Lee, S. h. Lee, R. Cheung, U. Lee, and M. Gerla. First experience with cartorrent in a real vehicular ad hoc network testbed. In 2007 Mobile Networking for Vehicular Environments, pages 109-114, May 2007.
-
(2007)
2007 Mobile Networking for Vehicular Environments
, pp. 109-114
-
-
Lee, K.C.1
Lee, S.H.2
Cheung, R.3
Lee, U.4
Gerla, M.5
-
34
-
-
84897889797
-
-
Web article, September
-
R. K. LEE RAINIE, SARA KIESLER and M. MADDEN. Anonymity, privacy, and security online. Web article, September 2015.
-
(2015)
Anonymity, Privacy, and Security Online
-
-
Rainie, R.K.L.1
Kiesler, S.2
Madden, M.3
-
35
-
-
84958229308
-
Keyframe-based visual-inertial odometry using nonlinear optimization
-
S. Leutenegger, S. Lynen, M. Bosse, R. Siegwart, and P. Furgale. Keyframe-based visual-inertial odometry using nonlinear optimization. The International Journal of Robotics Research, 2014.
-
(2014)
The International Journal of Robotics Research
-
-
Leutenegger, S.1
Lynen, S.2
Bosse, M.3
Siegwart, R.4
Furgale, P.5
-
36
-
-
37849037421
-
Learning multi-scale block local binary patterns for face recognition
-
Berlin, Heidelberg, Springer-Verlag
-
S. Liao, X. Zhu, Z. Lei, L. Zhang, and S. Z. Li. Learning multi-scale block local binary patterns for face recognition. In Proceedings of the 2007 International Conference on Advances in Biometrics, ICB'07, pages 828-837, Berlin, Heidelberg, 2007. Springer-Verlag.
-
(2007)
Proceedings of the 2007 International Conference on Advances in Biometrics, ICB'07
, pp. 828-837
-
-
Liao, S.1
Zhu, X.2
Lei, Z.3
Zhang, L.4
Li, S.Z.5
-
38
-
-
84962260746
-
Spotfi: Decimeter level localization using wifi
-
Aug.
-
D. B. Manikanta Kotaru, Kiran Joshi and S. Katti. Spotfi: Decimeter level localization using wifi. SIGCOMM Comput. Commun. Rev., 45(5):269-282, Aug. 2015.
-
(2015)
SIGCOMM Comput. Commun. Rev.
, vol.45
, Issue.5
, pp. 269-282
-
-
Kotaru, D.B.M.1
Joshi, K.2
Katti, S.3
-
39
-
-
65349086799
-
Shake well before use: Intuitive and secure pairing of mobile devices
-
June
-
R. Mayrhofer and H. Gellersen. Shake well before use: Intuitive and secure pairing of mobile devices. IEEE Transactions on Mobile Computing, 8(6):792-806, June 2009.
-
(2009)
IEEE Transactions on Mobile Computing
, vol.8
, Issue.6
, pp. 792-806
-
-
Mayrhofer, R.1
Gellersen, H.2
-
41
-
-
0026044290
-
Sound localization by human listeners
-
PMID: 2018391
-
J. C. Middlebrooks and D. M. Green. Sound localization by human listeners. Annual Review of Psychology, 42(1):135-159, 1991. PMID: 2018391.
-
(1991)
Annual Review of Psychology
, vol.42
, Issue.1
, pp. 135-159
-
-
Middlebrooks, J.C.1
Green, D.M.2
-
42
-
-
85001702494
-
-
W. H. D. F. moderator. April
-
W. H. D. F. moderator. Hologram sharing, April 2016.
-
(2016)
Hologram Sharing
-
-
-
43
-
-
84862582821
-
Analyzing the secure simple pairing in bluetooth v4.0
-
R. C.-W. Phan and P. Mingard. Analyzing the secure simple pairing in bluetooth v4.0. Wireless Personal Communications, 64(4):719-737, 2010.
-
(2010)
Wireless Personal Communications
, vol.64
, Issue.4
, pp. 719-737
-
-
Phan, R.C.-W.1
Mingard, P.2
-
44
-
-
77954796347
-
An adaptive content sharing protocol for p2p mobile social networks
-
April
-
B. Qureshi, G. Min, D. Kouvatsos, and M. Ilyas. An adaptive content sharing protocol for p2p mobile social networks. In Advanced Information Networking and Applications Workshops (WAINA), 2010 IEEE 24th International Conference on, pages 413-418, April 2010.
-
(2010)
Advanced Information Networking and Applications Workshops (WAINA), 2010 IEEE 24th International Conference on
, pp. 413-418
-
-
Qureshi, B.1
Min, G.2
Kouvatsos, D.3
Ilyas, M.4
-
45
-
-
84897010648
-
Security and privacy for augmented reality systems
-
Apr.
-
F. Roesner, T. Kohno, and D. Molnar. Security and privacy for augmented reality systems. Commun. ACM, 57(4):88-96, Apr. 2014.
-
(2014)
Commun. ACM
, vol.57
, Issue.4
, pp. 88-96
-
-
Roesner, F.1
Kohno, T.2
Molnar, D.3
-
47
-
-
68849111318
-
Secure pairing of "interface-constrained" devices resistant against rushing user behavior
-
Berlin, Heidelberg, Springer-Verlag
-
N. Saxena and M. B. Uddin. Secure pairing of "interface-constrained" devices resistant against rushing user behavior. In Proceedings of the 7th International Conference on Applied Cryptography and Network Security, ACNS '09, pages 34-52, Berlin, Heidelberg, 2009. Springer-Verlag.
-
(2009)
Proceedings of the 7th International Conference on Applied Cryptography and Network Security, ACNS '09
, pp. 34-52
-
-
Saxena, N.1
Uddin, M.B.2
-
48
-
-
0022683359
-
Multiple emitter location and signal parameter estimation
-
Mar
-
R. Schmidt. Multiple emitter location and signal parameter estimation. Antennas and Propagation, IEEE Transactions on, 34(3):276-280, Mar 1986.
-
(1986)
Antennas and Propagation, IEEE Transactions on
, vol.34
, Issue.3
, pp. 276-280
-
-
Schmidt, R.1
-
49
-
-
2642522597
-
-
None
-
D. B. Smetters, D. Balfanz, D. K. Smetters, P. Stewart, and H. C. Wong. Talking to strangers: Authentication in ad-hoc wireless networks. In None, 2002.
-
(2002)
Talking to Strangers: Authentication in Ad-hoc Wireless Networks
-
-
Smetters, D.B.1
Balfanz, D.2
Smetters, D.K.3
Stewart, P.4
Wong, H.C.5
-
51
-
-
56649100493
-
HAPADEP: Human-Assisted Pure Audio Device Pairing
-
chapter Springer Berlin Heidelberg, Berlin, Heidelberg
-
C. Soriente, G. Tsudik, and E. Uzun. Information Security: 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings, chapter HAPADEP: Human-Assisted Pure Audio Device Pairing, pages 385-400. Springer Berlin Heidelberg, Berlin, Heidelberg, 2008.
-
(2008)
Information Security: 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings
, pp. 385-400
-
-
Soriente, C.1
Tsudik, G.2
Uzun, E.3
-
52
-
-
84947251443
-
The resurrecting duckling: Security issues for ad-hoc wireless networks
-
London, UK, UK, Springer-Verlag
-
F. Stajano and R. J. Anderson. The resurrecting duckling: Security issues for ad-hoc wireless networks. In Proceedings of the 7th International Workshop on Security Protocols, pages 172-194, London, UK, UK, 2000. Springer-Verlag.
-
(2000)
Proceedings of the 7th International Workshop on Security Protocols
, pp. 172-194
-
-
Stajano, F.1
Anderson, R.J.2
-
54
-
-
33645081454
-
Newborns' face recognition: Role of inner and outer facial features
-
March
-
S. F. Turati C, Macchi Cassia V and L. I. Newborns' face recognition: role of inner and outer facial features. Child Development, 77:297-311, March 2006.
-
(2006)
Child Development
, vol.77
, pp. 297-311
-
-
Turati C, S.F.1
Cassia V, M.2
I, L.3
-
55
-
-
38549108892
-
Usability Analysis of Secure Pairing Methods
-
chapter Springer Berlin Heidelberg, Berlin, Heidelberg
-
E. Uzun, K. Karvonen, and N. Asokan. Financial Cryptography and Data Security, chapter Usability Analysis of Secure Pairing Methods, pages 307-324. Springer Berlin Heidelberg, Berlin, Heidelberg, 2007.
-
(2007)
Financial Cryptography and Data Security
, pp. 307-324
-
-
Uzun, E.1
Karvonen, K.2
Asokan, N.3
-
56
-
-
85073923570
-
Decimeter-level localization with a single wifi access point
-
Santa Clara, CA, Mar. USENIX Association
-
D. Vasisht, S. Kumar, and D. Katabi. Decimeter-level localization with a single wifi access point. In 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16), pages 165-178, Santa Clara, CA, Mar. 2016. USENIX Association.
-
(2016)
13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16)
, pp. 165-178
-
-
Vasisht, D.1
Kumar, S.2
Katabi, D.3
-
57
-
-
33745156127
-
Secure communications over insecure channels based on short authenticated strings
-
Berlin, Heidelberg, Springer-Verlag
-
S. Vaudenay. Secure communications over insecure channels based on short authenticated strings. In Proceedings of the 25th Annual International Conference on Advances in Cryptology, CRYPTO'05, pages 309-326, Berlin, Heidelberg, 2005. Springer-Verlag.
-
(2005)
Proceedings of the 25th Annual International Conference on Advances in Cryptology, CRYPTO'05
, pp. 309-326
-
-
Vaudenay, S.1
-
59
-
-
84976861826
-
Back to the real world
-
July
-
P. Wellner, W. Mackay, and R. Gold. Back to the real world. Commun. ACM, 36(7):24-26, July 1993.
-
(1993)
Commun. ACM
, vol.36
, Issue.7
, pp. 24-26
-
-
Wellner, P.1
Mackay, W.2
Gold, R.3
-
60
-
-
84892653858
-
From rssi to csi: Indoor localization via channel response
-
Dec.
-
Z. Yang, Z. Zhou, and Y. Liu. From rssi to csi: Indoor localization via channel response. ACM Comput. Surv., 46(2):25:1-25:32, Dec. 2013.
-
(2013)
ACM Comput. Surv.
, vol.46
, Issue.2
, pp. 25:1-25:32
-
-
Yang, Z.1
Zhou, Z.2
Liu, Y.3
|