{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T05:37:02Z","timestamp":1751607422961,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,3,16]],"date-time":"2020-03-16T00:00:00Z","timestamp":1584316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"European Regional Development Fund","award":["KK.01.1.1.01.0009"],"award-info":[{"award-number":["KK.01.1.1.01.0009"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,3,16]]},"DOI":"10.1145\/3374664.3375740","type":"proceedings-article","created":{"date-parts":[[2020,3,13]],"date-time":"2020-03-13T17:06:53Z","timestamp":1584119213000},"page":"61-72","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Tap-Pair"],"prefix":"10.1145","author":[{"given":"Ivo","family":"Sluganovic","sequence":"first","affiliation":[{"name":"University of Oxford, Oxford, United Kingdom"}]},{"given":"Mihael","family":"Liskij","sequence":"additional","affiliation":[{"name":"ETH Zurich, Zurich, Switzerland"}]},{"given":"Ante","family":"Derek","sequence":"additional","affiliation":[{"name":"University of Zagreb, Zagreb, Croatia"}]},{"given":"Ivan","family":"Martinovic","sequence":"additional","affiliation":[{"name":"University of Oxford, Oxford, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2020,3,16]]},"reference":[{"volume-title":"Security of the J-PAKE Password-Authenticated Key Exchange Protocol. In 2015 IEEE Symposium on Security and Privacy. 571--587","author":"Abdalla M.","key":"e_1_3_2_1_1_1","unstructured":"M. Abdalla, F. Benhamouda, and P. MacKenzie. 2015. Security of the J-PAKE Password-Authenticated Key Exchange Protocol. In 2015 IEEE Symposium on Security and Privacy. 571--587."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19074-2_11"},{"key":"e_1_3_2_1_3_1","volume-title":"Israeli Army Prepares Augmented Reality for Battlefield Duty. Bloomberg Technology","author":"Ackerman Gwen","year":"2017","unstructured":"Gwen Ackerman and Dina Bass. 2017. Israeli Army Prepares Augmented Reality for Battlefield Duty. Bloomberg Technology (2017). https:\/\/www.bloomberg.com\/news\/articles\/2016-08--15\/microsoft-s-hololens-technology-adopted-by-israeli-military Accessed May 2017."},{"key":"e_1_3_2_1_4_1","volume-title":"https:\/\/developer.apple.com\/arkit\/ Accessed","author":"Apple Inc. 2018. ARKit 2.","year":"2018","unstructured":"Apple Inc. 2018. ARKit 2. https:\/\/developer.apple.com\/arkit\/ Accessed November 2018."},{"volume-title":"IEEE Symposium on Security and Privacy .","author":"Steven","key":"e_1_3_2_1_5_1","unstructured":"Steven M. Bellovin and Michael Merritt. 1992. Encrypted key exchange: password-based protocols secure against dictionary attacks. In IEEE Symposium on Security and Privacy ."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2006.879305"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756169.1756186"},{"key":"e_1_3_2_1_8_1","unstructured":"DavidPhelan. 2017. Tim Cook on the importance of coding and Augmented Reality. https:\/\/www.independent.co.uk\/life-style\/gadgets-and-tech\/features\/apple-tim-cook-boss-brexit-uk-theresa-may-number-10-interview-ustwo-a7574086.html Accessed August 2018."},{"key":"e_1_3_2_1_9_1","volume-title":"Security and Privacy Approaches in Mixed Reality: A Literature Survey. arXiv preprint arXiv:1802.05797","author":"de Guzman Jaybie A","year":"2018","unstructured":"Jaybie A de Guzman, Kanchana Thilakarathna, and Aruna Seneviratne. 2018. Security and Privacy Approaches in Mixed Reality: A Literature Survey. arXiv preprint arXiv:1802.05797 (2018)."},{"volume-title":"Proceedings of the 6th International Workshop on Trustworthy Embedded Devices (TrustED '16)","author":"Gaebel Ethan","key":"e_1_3_2_1_10_1","unstructured":"Ethan Gaebel, Ning Zhang, Wenjing Lou, and Y. Thomas Hou. 2016. Looks Good To Me: Authentication for Augmented Reality. In Proceedings of the 6th International Workshop on Trustworthy Embedded Devices (TrustED '16). ACM, New York, NY, USA, 57--67."},{"key":"e_1_3_2_1_11_1","volume-title":"https:\/\/developers.google.com\/ar\/ Accessed","author":"Google Inc. 2018. ARCore .","year":"2018","unstructured":"Google Inc. 2018. ARCore . https:\/\/developers.google.com\/ar\/ Accessed November 2018."},{"volume-title":"J-PAKE: Authenticated Key Exchange without PKI","author":"Hao Feng","key":"e_1_3_2_1_12_1","unstructured":"Feng Hao and Peter Ryan. 2010. J-PAKE: Authenticated Key Exchange without PKI .Springer Berlin Heidelberg, 192--206."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Feng Hao Xun Yi Liqun Chen and Siamak Shahandashti. 2015. The Fairy-Ring Dance. 27--34.","DOI":"10.1145\/2732209.2732212"},{"key":"e_1_3_2_1_14_1","volume-title":"Spark AR Studio . https:\/\/sparkar.com\/ar-studio Accessed","author":"Facebook Inc. 2018.","year":"2018","unstructured":"Facebook Inc. 2018. Spark AR Studio . https:\/\/sparkar.com\/ar-studio Accessed December 2018."},{"key":"e_1_3_2_1_15_1","volume-title":"Unity Game Development Platform . https:\/\/unity3d.com\/ Accessed","author":"Unity Inc. 2017.","year":"2017","unstructured":"Unity Inc. 2017. Unity Game Development Platform . https:\/\/unity3d.com\/ Accessed May 2017."},{"key":"e_1_3_2_1_16_1","volume-title":"https:\/\/www.bloomberg.com\/news\/articles\/2018--11--28\/microsoft-wins-480-million-army-battlefield-contract Accessed","author":"Brustein Joshua","year":"2018","unstructured":"Joshua Brustein. 2018. Microsoft Wins $480 Million Army Battlefield Contract. https:\/\/www.bloomberg.com\/news\/articles\/2018--11--28\/microsoft-wins-480-million-army-battlefield-contract Accessed November 2018."},{"volume-title":"Proceedings of the 5th Symposium on Usable Privacy and Security (SOUPS '09)","author":"Kainda Ronald","key":"e_1_3_2_1_17_1","unstructured":"Ronald Kainda, Ivan Flechais, and A. W. Roscoe. 2009. Usability and Security of Out-of-band Channels in Secure Device Pairing Protocols. In Proceedings of the 5th Symposium on Usable Privacy and Security (SOUPS '09). ACM, New York, NY, USA, Article 11, bibinfonumpages12 pages."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572546"},{"key":"e_1_3_2_1_19_1","volume-title":"Mixed Reality' Technology Brings Mars to Earth. NASA Jet Propulsion Laboratory","author":"Landau Elizabeth","year":"2017","unstructured":"Elizabeth Landau. 2017. 'Mixed Reality' Technology Brings Mars to Earth. NASA Jet Propulsion Laboratory (2017). https:\/\/www.jpl.nasa.gov\/news\/news.php?feature=6220 Accessed May 2017."},{"volume-title":"Towards Security and Privacy for Multi-User Augmented Reality: Foundations with End Users","author":"Lebeck Kiron","key":"e_1_3_2_1_20_1","unstructured":"Kiron Lebeck, Kimberly Ruth, Tadayoshi Kohno, and Franziska Roesner. 2018. Towards Security and Privacy for Multi-User Augmented Reality: Foundations with End Users. In Towards Security and Privacy for Multi-User Augmented Reality: Foundations with End Users. IEEE."},{"key":"e_1_3_2_1_21_1","volume-title":"Microsoft HoloLens becomes an AR assistant for spinal surgery. Engadget","author":"Lumb David","year":"2017","unstructured":"David Lumb. 2017. Microsoft HoloLens becomes an AR assistant for spinal surgery. Engadget (2017). https:\/\/www.engadget.com\/2017\/05\/05\/microsoft-hololens-becomes-an-ar-assistant-for-spinal-surgery Accessed May 2017."},{"key":"e_1_3_2_1_22_1","volume-title":"Magic Leap One. https:\/\/www.magicleap.com\/magic-leap-one Accessed","author":"Leap Magic","year":"2018","unstructured":"Magic Leap. 2018. Magic Leap One. https:\/\/www.magicleap.com\/magic-leap-one Accessed November 2018."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2009.51"},{"key":"e_1_3_2_1_24_1","volume-title":"Meta Augmented Reality. https:\/\/www.metavision.com\/ Accessed","author":"Vision Meta","year":"2018","unstructured":"Meta Vision. 2018. Meta Augmented Reality. https:\/\/www.metavision.com\/ Accessed November 2018."},{"key":"e_1_3_2_1_25_1","volume-title":"https:\/\/www.microsoft.com\/en-us\/hololens Accessed","author":"HoloLens Microsoft","year":"2018","unstructured":"Microsoft. 2018. Microsoft HoloLens. https:\/\/www.microsoft.com\/en-us\/hololens Accessed August 2018."},{"key":"e_1_3_2_1_26_1","unstructured":"Microsoft. 2018. Microsoft HoloLens . https:\/\/www.microsoft.com\/en-ca\/hololens . Acessed: 2018-06--12."},{"volume-title":"2019 a. HoloLens 2-Mixed reality is ready for business. https:\/\/www.microsoft.com\/en-us\/hololens Accessed","year":"2019","key":"e_1_3_2_1_27_1","unstructured":"Microsoft. 2019 a. HoloLens 2-Mixed reality is ready for business. https:\/\/www.microsoft.com\/en-us\/hololens Accessed June 2019."},{"volume-title":"2019 b. MixedRealityToolkit-Unity uses code from the base MixedRealityToolkit repository and makes it easier to consume in Unity. https:\/\/github.com\/microsoft\/MixedRealityToolkit-Unity Accessed","year":"2019","key":"e_1_3_2_1_28_1","unstructured":"Microsoft. 2019 b. MixedRealityToolkit-Unity uses code from the base MixedRealityToolkit repository and makes it easier to consume in Unity. https:\/\/github.com\/microsoft\/MixedRealityToolkit-Unity Accessed June 2019."},{"volume-title":"Telemanipulator and telepresence technologies","author":"Milgram Paul","key":"e_1_3_2_1_29_1","unstructured":"Paul Milgram, Haruo Takemura, Akira Utsumi, and Fumio Kishino. 1995. Augmented reality: A class of displays on the reality-virtuality continuum. In Telemanipulator and telepresence technologies, Vol. 2351. International Society for Optics and Photonics, 282--293."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2580723.2580730"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00196725"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134600.3134625"},{"key":"e_1_3_2_1_34_1","volume-title":"The ultimate display. Multimedia: From Wagner to virtual reality","author":"Sutherland Ivan E","year":"1965","unstructured":"Ivan E Sutherland. 1965. The ultimate display. Multimedia: From Wagner to virtual reality (1965)."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025733"},{"key":"e_1_3_2_1_36_1","volume-title":"Elvis CS Chen, and Terry M Peters","author":"Vassallo Reid","year":"2017","unstructured":"Reid Vassallo, Adam Rankin, Elvis CS Chen, and Terry M Peters. 2017. Hologram stability evaluation for Microsoft HoloLens. In Medical Imaging 2017: Image Perception, Observer Performance, and Technology Assessment , Vol. 10136. International Society for Optics and Photonics, 1013614."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/11535218_19"},{"key":"e_1_3_2_1_38_1","volume-title":"Proceedings of the 7th IEEE\/ACM International Symposium on Mixed and Augmented Reality. IEEE Computer Society, 193--202","author":"Zhou Feng","year":"2008","unstructured":"Feng Zhou, Henry Been-Lirn Duh, and Mark Billinghurst. 2008. Trends in augmented reality tracking, interaction and display: A review of ten years of ISMAR. In Proceedings of the 7th IEEE\/ACM International Symposium on Mixed and Augmented Reality. IEEE Computer Society, 193--202."}],"event":{"name":"CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"New Orleans LA USA","acronym":"CODASPY '20"},"container-title":["Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3374664.3375740","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3374664.3375740","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:33:08Z","timestamp":1750199588000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3374664.3375740"}},"subtitle":["Using Spatial Secrets for Single-Tap Device Pairing of Augmented Reality Headsets"],"short-title":[],"issued":{"date-parts":[[2020,3,16]]},"references-count":37,"alternative-id":["10.1145\/3374664.3375740","10.1145\/3374664"],"URL":"https:\/\/doi.org\/10.1145\/3374664.3375740","relation":{},"subject":[],"published":{"date-parts":[[2020,3,16]]},"assertion":[{"value":"2020-03-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}