Augmented and Virtual Reality (AR/VR) technology has advanced significantly in recent years, with recent applications in military, medicine, and education. Currently, most security artifacts utilized in AR/VR contexts are drawn from existing computing. These artifacts, however, were developed during the early ages of computing, to satisfy a completely different set of assumptions. In the context of AR/VR these assumptions have changed significantly. This research seeks to develop a general model of knowledge-based authentication (KBA). The model will be evaluated in the AR/VR context. This research will draw attention to the importance of considering security artifacts in the context for which they are being used, not for which they were or...
Augmented Reality (AR) Head-Mounted Displays (HMD) are increasingly used in industry to digitize pro...
In this paper, we present a case study of potential security and privacy threats from virtual realit...
In situ evaluations of novel authentication systems, where the system is evaluated in its intended u...
With the increasing adoption of virtual reality (VR) in public spaces, protecting users from observa...
Immersive technologies, including augmented and virtual reality (AR & VR) devices, have enhanced dig...
Evaluating novel authentication systems is often costly and time-consuming. In this work, we assess ...
Wearable augmented reality (AR) devices provide users a way to utilize computing resources while tak...
In recent years, VR and AR has exploded into a multimillionaire market. As this emerging technology ...
Virtual Reality (VR) and Augmented Reality (AR) technologies offer transformative solutions for indi...
Virtual reality (VR) headsets are enabling a wide range of new opportunities for the user. For exam...
Immersive Virtual Reality (IVR) is a growing 3D environment, where social and commercial application...
This research paper explores the intricate tapestry of security considerations in integrating augmen...
As technologies become more advanced and powerful each day, the progression towards embracing virtua...
Thesis (Ph.D.)--University of Washington, 2019Augmented reality (AR) has emerged as a powerful compu...
There is a growing need for usable and secure authentication in virtual reality (VR). Established co...
Augmented Reality (AR) Head-Mounted Displays (HMD) are increasingly used in industry to digitize pro...
In this paper, we present a case study of potential security and privacy threats from virtual realit...
In situ evaluations of novel authentication systems, where the system is evaluated in its intended u...
With the increasing adoption of virtual reality (VR) in public spaces, protecting users from observa...
Immersive technologies, including augmented and virtual reality (AR & VR) devices, have enhanced dig...
Evaluating novel authentication systems is often costly and time-consuming. In this work, we assess ...
Wearable augmented reality (AR) devices provide users a way to utilize computing resources while tak...
In recent years, VR and AR has exploded into a multimillionaire market. As this emerging technology ...
Virtual Reality (VR) and Augmented Reality (AR) technologies offer transformative solutions for indi...
Virtual reality (VR) headsets are enabling a wide range of new opportunities for the user. For exam...
Immersive Virtual Reality (IVR) is a growing 3D environment, where social and commercial application...
This research paper explores the intricate tapestry of security considerations in integrating augmen...
As technologies become more advanced and powerful each day, the progression towards embracing virtua...
Thesis (Ph.D.)--University of Washington, 2019Augmented reality (AR) has emerged as a powerful compu...
There is a growing need for usable and secure authentication in virtual reality (VR). Established co...
Augmented Reality (AR) Head-Mounted Displays (HMD) are increasingly used in industry to digitize pro...
In this paper, we present a case study of potential security and privacy threats from virtual realit...
In situ evaluations of novel authentication systems, where the system is evaluated in its intended u...