{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T17:51:39Z","timestamp":1764784299068,"version":"3.40.3"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030299583"},{"type":"electronic","value":"9783030299590"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-29959-0_8","type":"book-chapter","created":{"date-parts":[[2019,9,14]],"date-time":"2019-09-14T23:04:10Z","timestamp":1568502250000},"page":"149-169","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["A First Look into Privacy Leakage in 3D Mixed Reality Data"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2816-7721","authenticated-orcid":false,"given":"Jaybie A.","family":"de Guzman","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4332-0082","authenticated-orcid":false,"given":"Kanchana","family":"Thilakarathna","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6894-7987","authenticated-orcid":false,"given":"Aruna","family":"Seneviratne","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,15]]},"reference":[{"key":"8_CR1","unstructured":"Acquisti, A.: Privacy in the age of augmented reality (2011)"},{"issue":"3","key":"8_CR2","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1145\/292834.292836","volume":"5","author":"S Benford","year":"1998","unstructured":"Benford, S., Greenhalgh, C., Reynard, G., Brown, C., Koleva, B.: Understanding and constructing shared spaces with mixed-reality boundaries. ACM Trans. Comput. Hum. Interact. (TOCHI) 5(3), 185\u2013223 (1998)","journal-title":"ACM Trans. Comput. Hum. Interact. (TOCHI)"},{"key":"8_CR3","unstructured":"Bronstein, A.M., et al.: SHREC 2010: robust feature detection and description benchmark. In: Proceedings of EUROGRAPHICS Workshop on 3D Object Retrieval (3DOR) (2010)"},{"issue":"3\u20134","key":"8_CR4","first-page":"211","volume":"9","author":"C Dwork","year":"2014","unstructured":"Dwork, C., Roth, A., et al.: The algorithmic foundations of differential privacy. Found. Trends\u00ae Theor. Comput. Sci. 9(3\u20134), 211\u2013407 (2014)","journal-title":"Found. Trends\u00ae Theor. Comput. Sci."},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Figueiredo, L.S., Livshits, B., Molnar, D., Veanes, M.: Prepose: privacy, security, and reliability for gesture-based programming. In: 2016 IEEE Symposium on Security and Privacy (SP), pp. 122\u2013137. IEEE (2016)","DOI":"10.1109\/SP.2016.16"},{"issue":"6","key":"8_CR6","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1145\/358669.358692","volume":"24","author":"MA Fischler","year":"1981","unstructured":"Fischler, M.A., Bolles, R.C.: Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography. Commun. ACM 24(6), 381\u2013395 (1981)","journal-title":"Commun. ACM"},{"key":"8_CR7","doi-asserted-by":"publisher","unstructured":"Gross, R., Sweeney, L., de la Torre, F., Baker, S.: Semi-supervised learning of multi-factor models for face de-identification. In: 2008 IEEE Conference on Computer Vision and Pattern Recognition, pp. 1\u20138, June 2008. https:\/\/doi.org\/10.1109\/CVPR.2008.4587369","DOI":"10.1109\/CVPR.2008.4587369"},{"key":"8_CR8","unstructured":"de Guzman, J.A., Thilakarathna, K., Seneviratne, A.: Security and privacy approaches in mixed reality: a literature survey. arXiv preprint arXiv:1802.05797 (2018)"},{"issue":"1","key":"8_CR9","first-page":"6","volume":"8","author":"W He","year":"2011","unstructured":"He, W., Liu, X., Nguyen, H.V., Nahrstedt, K., Abdelzaher, T.: PDA: privacy-preserving data aggregation for information collection. ACM Trans. Sens. Netw. (TOSN) 8(1), 6 (2011)","journal-title":"ACM Trans. Sens. Netw. (TOSN)"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Huang, J., You, S.: Point cloud matching based on 3d self-similarity. In: 2012 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), pp. 41\u201348. IEEE (2012)","DOI":"10.1109\/CVPRW.2012.6238913"},{"key":"8_CR11","unstructured":"Jana, S., et al.: Enabling fine-grained permissions for augmented reality applications with recognizers. In: USENIX Security (2013)"},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"Jana, S., Narayanan, A., Shmatikov, V.: A scanner darkly: protecting user privacy from perceptual applications. In: 2013 IEEE Symposium on Security and Privacy (SP), pp. 349\u2013363. IEEE (2013)","DOI":"10.1109\/SP.2013.31"},{"key":"8_CR13","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1109\/34.765655","volume":"5","author":"AE Johnson","year":"1999","unstructured":"Johnson, A.E., Hebert, M.: Using spin images for efficient object recognition in cluttered 3d scenes. IEEE Trans. Pattern Anal. Mach. Intell. 5, 433\u2013449 (1999)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"9\u201310","key":"8_CR14","doi-asserted-by":"publisher","first-page":"635","DOI":"10.1016\/S0262-8856(98)00074-2","volume":"16","author":"AE Johnson","year":"1998","unstructured":"Johnson, A.E., Hebert, M.: Surface matching for object recognition in complex three-dimensional scenes. Image Vis. Comput. 16(9\u201310), 635\u2013651 (1998)","journal-title":"Image Vis. Comput."},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"Lebeck, K., Kohno, T., Roesner, F.: How to safely augment reality: challenges and directions. In: Proceedings of the 17th International Workshop on Mobile Computing Systems and Applications, pp. 45\u201350. ACM (2016)","DOI":"10.1145\/2873587.2873595"},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"Lebeck, K., Ruth, K., Kohno, T., Roesner, F.: Securing augmented reality output. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 320\u2013337. IEEE (2017)","DOI":"10.1109\/SP.2017.13"},{"key":"8_CR17","doi-asserted-by":"crossref","unstructured":"Lebeck, K., Ruth, K., Kohno, T., Roesner, F.: Towards security and privacy for multi-user augmented reality: foundations with end users. In: Towards Security and Privacy for Multi-User Augmented Reality: Foundations with End Users, p. 0. IEEE (2018)","DOI":"10.1109\/SP.2018.00051"},{"issue":"12","key":"8_CR18","first-page":"1321","volume":"77","author":"P Milgram","year":"1994","unstructured":"Milgram, P., Kishino, F.: A taxonomy of mixed reality visual displays. IEICE Trans. Inf. Syst. 77(12), 1321\u20131329 (1994)","journal-title":"IEICE Trans. Inf. Syst."},{"issue":"2","key":"8_CR19","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1109\/TKDE.2005.32","volume":"17","author":"EM Newton","year":"2005","unstructured":"Newton, E.M., Sweeney, L., Malin, B.: Preserving privacy by de-identifying face images. IEEE Trans. Knowl. Data Eng. 17(2), 232\u2013243 (2005)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"8_CR20","doi-asserted-by":"crossref","unstructured":"Raval, N., Srivastava, A., Razeen, A., Lebeck, K., Machanavajjhala, A., Cox, L.P.: What you mark is what apps see. In: Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services, pp. 249\u2013261. ACM (2016)","DOI":"10.1145\/2906388.2906405"},{"key":"8_CR21","doi-asserted-by":"crossref","unstructured":"Roesner, F., Molnar, D., Moshchuk, A., Kohno, T., Wang, H.J.: World-driven access control for continuous sensing. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 1169\u20131181. ACM (2014)","DOI":"10.1145\/2660267.2660319"},{"key":"8_CR22","doi-asserted-by":"crossref","unstructured":"Shokri, R., Theodorakopoulos, G., Le Boudec, J.Y., Hubaux, J.P.: Quantifying location privacy. In: 2011 IEEE Symposium on Security and Privacy, pp. 247\u2013262. IEEE (2011)","DOI":"10.1109\/SP.2011.18"},{"issue":"05","key":"8_CR23","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 10(05), 557\u2013570 (2002)","journal-title":"Int. J. Uncertain. Fuzziness Knowl. Based Syst."},{"key":"8_CR24","doi-asserted-by":"crossref","unstructured":"Vilk, J., et al.: SurroundWeb: mitigating privacy concerns in a 3d web browser. In: 2015 IEEE Symposium on Security and Privacy (SP), pp. 431\u2013446. IEEE (2015)","DOI":"10.1109\/SP.2015.33"},{"key":"8_CR25","unstructured":"Vilk, J., et al.: Least privilege rendering in a 3d web browser. Technical report (2014)"},{"issue":"3","key":"8_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3168389","volume":"51","author":"Isabel Wagner","year":"2018","unstructured":"Wagner, I., Eckhoff, D.: Technical privacy metrics: a systematic survey. ACM Comput. Surv. 51(3), 57:1\u201357:38 (2018). https:\/\/doi.org\/10.1145\/3168389, http:\/\/doi.acm.org\/10.1145\/3168389","journal-title":"ACM Computing Surveys"},{"key":"8_CR27","unstructured":"Wu, Y., Yang, F., Ling, H.: Privacy-protective-gan for face de-identification. arXiv preprint arXiv:1806.08906 (2018)"},{"key":"8_CR28","doi-asserted-by":"crossref","unstructured":"Zarepour, E., Hosseini, M., Kanhere, S.S., Sowmya, A.: A context-based privacy preserving framework for wearable visual lifeloggers. In: 2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops), pp. 1\u20134. IEEE (2016)","DOI":"10.1109\/PERCOMW.2016.7457057"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2019"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-29959-0_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T00:04:21Z","timestamp":1726358661000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-29959-0_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030299583","9783030299590"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-29959-0_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"15 September 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Luxembourg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Luxembourg","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/conf.laas.fr\/esorics\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"344","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"67","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3,2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"11","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}