Security and privacy approaches in mixed reality: A literature survey
JA De Guzman, K Thilakarathna… - ACM Computing Surveys …, 2019 - dl.acm.org
Mixed reality (MR) technology development is now gaining momentum due to advances in
computer vision, sensor fusion, and realistic display technologies. With most of the research …
computer vision, sensor fusion, and realistic display technologies. With most of the research …
The role of eye gaze in security and privacy applications: Survey and future HCI research directions
For the past 20 years, researchers have investigated the use of eye tracking in security
applications. We present a holistic view on gaze-based security applications. In particular …
applications. We present a holistic view on gaze-based security applications. In particular …
Multimodal deep learning for activity and context recognition
Wearables and mobile devices see the world through the lens of half a dozen low-power
sensors, such as, barometers, accelerometers, microphones and proximity detectors. But …
sensors, such as, barometers, accelerometers, microphones and proximity detectors. But …
Sensor-based continuous authentication of smartphones' users using behavioral biometrics: A contemporary survey
Mobile devices and technologies have become increasingly popular, offering comparable
storage and computational capabilities to desktop computers allowing users to store and …
storage and computational capabilities to desktop computers allowing users to store and …
Understanding shoulder surfing in the wild: Stories from users and observers
Research has brought forth a variety of authentication systems to mitigate observation
attacks. However, there is little work about shoulder surfing situations in the real world. We …
attacks. However, there is little work about shoulder surfing situations in the real world. We …
Evaluation of appearance-based methods and implications for gaze-based applications
Appearance-based gaze estimation methods that only require an off-the-shelf camera have
significantly improved but they are still not yet widely used in the human-computer …
significantly improved but they are still not yet widely used in the human-computer …
Verticals in 5G MEC-use cases and security challenges
5G is the fifth-generation cellular network satisfying the requirements IMT-2020
(International Mobile Telecommunications-2020) of the International Telecommunication …
(International Mobile Telecommunications-2020) of the International Telecommunication …
Fast and secure authentication in virtual reality using coordinated 3d manipulation and pointing
There is a growing need for usable and secure authentication in immersive virtual reality
(VR). Established concepts (eg, 2D authentication schemes) are vulnerable to observation …
(VR). Established concepts (eg, 2D authentication schemes) are vulnerable to observation …
Seamless and secure vr: Adapting and evaluating established authentication systems for virtual reality
Virtual reality (VR) headsets are enabling a wide range of new opportunities for the user. For
example, in the near future users may be able to visit virtual shopping malls and virtually join …
example, in the near future users may be able to visit virtual shopping malls and virtually join …
Replicueauth: Validating the use of a lab-based virtual reality setup for evaluating authentication systems
Evaluating novel authentication systems is often costly and time-consuming. In this work, we
assess the suitability of using Virtual Reality (VR) to evaluate the usability and security of …
assess the suitability of using Virtual Reality (VR) to evaluate the usability and security of …