Security and privacy approaches in mixed reality: A literature survey

JA De Guzman, K Thilakarathna… - ACM Computing Surveys …, 2019 - dl.acm.org
Mixed reality (MR) technology development is now gaining momentum due to advances in
computer vision, sensor fusion, and realistic display technologies. With most of the research …

The role of eye gaze in security and privacy applications: Survey and future HCI research directions

C Katsini, Y Abdrabou, GE Raptis, M Khamis… - Proceedings of the 2020 …, 2020 - dl.acm.org
For the past 20 years, researchers have investigated the use of eye tracking in security
applications. We present a holistic view on gaze-based security applications. In particular …

Multimodal deep learning for activity and context recognition

V Radu, C Tong, S Bhattacharya, ND Lane… - Proceedings of the …, 2018 - dl.acm.org
Wearables and mobile devices see the world through the lens of half a dozen low-power
sensors, such as, barometers, accelerometers, microphones and proximity detectors. But …

Sensor-based continuous authentication of smartphones' users using behavioral biometrics: A contemporary survey

M Abuhamad, A Abusnaina, DH Nyang… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
Mobile devices and technologies have become increasingly popular, offering comparable
storage and computational capabilities to desktop computers allowing users to store and …

Understanding shoulder surfing in the wild: Stories from users and observers

M Eiband, M Khamis, E Von Zezschwitz… - Proceedings of the …, 2017 - dl.acm.org
Research has brought forth a variety of authentication systems to mitigate observation
attacks. However, there is little work about shoulder surfing situations in the real world. We …

Evaluation of appearance-based methods and implications for gaze-based applications

X Zhang, Y Sugano, A Bulling - Proceedings of the 2019 CHI conference …, 2019 - dl.acm.org
Appearance-based gaze estimation methods that only require an off-the-shelf camera have
significantly improved but they are still not yet widely used in the human-computer …

Verticals in 5G MEC-use cases and security challenges

TW Nowak, M Sepczuk, Z Kotulski, W Niewolski… - IEEE …, 2021 - ieeexplore.ieee.org
5G is the fifth-generation cellular network satisfying the requirements IMT-2020
(International Mobile Telecommunications-2020) of the International Telecommunication …

Fast and secure authentication in virtual reality using coordinated 3d manipulation and pointing

F Mathis, JH Williamson, K Vaniea… - ACM Transactions on …, 2021 - dl.acm.org
There is a growing need for usable and secure authentication in immersive virtual reality
(VR). Established concepts (eg, 2D authentication schemes) are vulnerable to observation …

Seamless and secure vr: Adapting and evaluating established authentication systems for virtual reality

C George, M Khamis, E von Zezschwitz, M Burger… - 2017 - eprints.gla.ac.uk
Virtual reality (VR) headsets are enabling a wide range of new opportunities for the user. For
example, in the near future users may be able to visit virtual shopping malls and virtually join …

Replicueauth: Validating the use of a lab-based virtual reality setup for evaluating authentication systems

F Mathis, K Vaniea, M Khamis - Proceedings of the 2021 chi conference …, 2021 - dl.acm.org
Evaluating novel authentication systems is often costly and time-consuming. In this work, we
assess the suitability of using Virtual Reality (VR) to evaluate the usability and security of …