In situ with bystanders of augmented reality glasses
How to Safely Augment Reality
Parenting from the pocket
Strengthening user authentication through opportunistic cryptographic identity assertions
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses
Shining Light in Dark Places: Understanding the Tor Network
Proceedings of the 2012 ACM conference on Computer and communications security - CCS ’12
Lecture Notes in Computer Science
Proceedings of the 17th International Workshop on Mobile Computing Systems and Applications - HotMobile ’16
Proceedings of the Sixth Symposium on Usable Privacy and Security - SOUPS ’10
Proceedings of the 32nd annual ACM conference on Human factors in computing systems - CHI ’14
2008 IEEE Symposium on Security and Privacy (sp 2008)
Alexei Czeskis
Zakariya Dehlawi
Dan Wallach
Tamara Denning
Hussein Yapit
Ivayla Dermendjieva
BEYOND REALITY
TrustLite: A Security Architecture for Tiny Embedded Devices
Legal and Ethical Implications of Mobile Live-streaming Video Apps
Normative Tensions in Shared Augmented Reality
Digital Alienation As the Foundation of Online Privacy Concerns
“It’s Kind of Boring Looking at Just the Face”