Author:
Riyadh H. T. M. A.,Bhardwaj Divyanshu,Dabrowski Adrian,Krombholz Katharina
Publisher
Springer Nature Switzerland
Reference49 articles.
1. Abdelrahman, Y., Khamis, M., Schneegass, S., Alt, F.: Stay cool! Understanding thermal attacks on mobile-based user authentication. In: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, pp. 3751–3763 (2017)
2. Alsop, T.: VR device shipments by vendor worldwide 2017–2019 (2022). https://www.statista.com/statistics/671403/global-virtual-reality-device-shipments-by-vendor/
3. Alsulaiman, F.A., El Saddik, A.: A novel 3D graphical password schema. In: 2006 IEEE Symposium on Virtual Environments, Human-Computer Interfaces and Measurement Systems, pp. 125–128. IEEE (2006)
4. Aviv, A.J., Gibson, K., Mossop, E., Blaze, M., Smith, J.M.: Smudge attacks on smartphone touch screens. In: 4th USENIX Workshop on Offensive Technologies (WOOT 10) (2010)
5. Ball, C., Huang, K.T., Francis, J.: Virtual reality adoption during the COVID-19 pandemic: a uses and gratifications perspective. Telematics Inform. 65, 101728 (2021)