{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T15:09:22Z","timestamp":1775228962786,"version":"3.50.1"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031580529","type":"print"},{"value":"9783031580536","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-58053-6_12","type":"book-chapter","created":{"date-parts":[[2024,5,19]],"date-time":"2024-05-19T20:25:06Z","timestamp":1716150306000},"page":"173-186","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Research on Highly Secure Metaverse Based on Extended Reality Under Edge Computing"],"prefix":"10.1007","author":[{"given":"Jinrong","family":"Fu","sequence":"first","affiliation":[]},{"given":"Yiwen","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Haobo","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Yahui","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Ling","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Yuanquan","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Tao","family":"Feng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,5,20]]},"reference":[{"key":"12_CR1","unstructured":"Hu, Z., Wen, J.: What is the metaverse? Why should you care about it? Xinhua Daily Telegraph 2021\u201311\u201321,004"},{"key":"12_CR2","doi-asserted-by":"publisher","unstructured":"Jiang, Y.: Orphans in the metaverse?\u2014\u2014Why video games serve as an educational platform for the next generation of children\u2019s philosophy. J. Guizhou Univ. (Soc. Sci.) 39(05), 21\u201329+120 (2021). doi:https:\/\/doi.org\/10.15958\/j.cnki.gdxbshb.2021.05.03.","DOI":"10.15958\/j.cnki.gdxbshb.2021.05.03"},{"key":"12_CR3","unstructured":"Zhong, B.: Essential Issues and Education Innovation Towards Online Teaching in Primary and Secondary School. China Educational Technology No.413.06, pp. 15\u201322 (2021)"},{"key":"12_CR4","doi-asserted-by":"publisher","unstructured":"Halabi, O., Balakrishnan, S., Dakua, S.P., Navab, N., Warfa, M.: Virtual and augmented reality in surgery. In: Doorsamy, W., Paul, B., Marwala, T. (eds.) The Disruptive Fourth Industrial Revolution. LNEE, vol. 674, pp. 257\u2013285. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-48230-5_11","DOI":"10.1007\/978-3-030-48230-5_11"},{"key":"12_CR5","unstructured":"Digital Intelligent Human: a fundamental unit in the meta-universe, and a new manifestation of service intelligence [EB\/OL], 19 March 2022. https:\/\/www.shangyexinzhi.com\/article\/4684994.html. Accessed 14 June 2022"},{"key":"12_CR6","unstructured":"Cotton, D.R.E., Cotton, P.A., Shipway, J.R.: Chatting and Cheating. Ensuring Academic Integrity in the Era of ChatGPT. https:\/\/edarxiv.org\/mrz8h\/"},{"issue":"1","key":"12_CR7","first-page":"52","volume":"48","author":"X Zhao","year":"2022","unstructured":"Zhao, X., Lu, Q.W.: Governance of the metaverse: a vision for agile governance in the future data intelligence world. J. Libr. Sci. China 48(1), 52\u201361 (2022)","journal-title":"J. Libr. Sci. China"},{"issue":"11","key":"12_CR8","doi-asserted-by":"publisher","first-page":"919","DOI":"10.1080\/0144929X.2016.1212931","volume":"35","author":"W Alhalabi","year":"2016","unstructured":"Alhalabi, W.: Virtual reality systems enhance students\u2019 achievements in engineering education. Behav. Inf. Technol. 35(11), 919\u2013925 (2016)","journal-title":"Behav. Inf. Technol."},{"key":"12_CR9","unstructured":"Digital Human. https:\/\/wiki.mbalib.com\/wiki\/%E6%95%B0%E5%AD%97%E4%BA%BA"},{"key":"12_CR10","unstructured":"Survey on data security and privacy-preserving for the research of edge computing. https:\/\/zhuanlan.zhihu.com\/p\/142914592"},{"key":"12_CR11","unstructured":"Microsoft Entra-Secure Authentication and Access Control | Microsoft Security. https:\/\/www.microsoft.com\/zh-cn\/security\/business\/microsoft-entra"},{"key":"12_CR12","unstructured":"Lee, L.-H., et al.: All one needs to know about metaverse: a complete survey on technological singularity, virtual ecosystem, and research agenda. J. Latex Class Files 14(8) (2021)"},{"key":"12_CR13","unstructured":"Paper Reading: A Summary of Key Technologies in the Metaverse. https:\/\/www.zhihu.com\/column\/c_1511365369852305410"},{"key":"12_CR14","unstructured":"Zhang, J., et al.: Survey on data security and privacy-preserving for the research of edge computing. J. Commun. 39(03), 1\u201321 (2018)"},{"key":"12_CR15","unstructured":"MUD underlying technology and future development. https:\/\/www.sohu.com\/a\/664038489_120538525"},{"key":"12_CR16","unstructured":"Research on the Development Status of the Metaverse and Research on Security Risks. https:\/\/www.secrss.com\/articles\/45265"},{"key":"12_CR17","doi-asserted-by":"publisher","unstructured":"Zhang, H., Zeng, X., Liang, Z.: Exploring the Metaverse: conceptual connotation, form development and evolution mechanism. Studies in Science of Science, 09 August 2022. https:\/\/doi.org\/10.16192\/j.cnki.1003-2053.20220808.001","DOI":"10.16192\/j.cnki.1003-2053.20220808.001"},{"key":"12_CR18","unstructured":"Zhang, H., Zeng, X., Liang, Z.: Exploring the Metaverse: Conceptual Connotation, Form Development and Evolution Mechanism. http:\/\/aiig.tsinghua.edu.cn\/info\/1368\/1629.htm"},{"key":"12_CR19","unstructured":"Computing of the Eight Cores of the Metaverse. https:\/\/zhuanlan.zhihu.com\/p\/438835959"},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"Liu, D., Wu, X., Cao, Z., Liu, M., Li, Y., Hou, M.: CD-MAC: a contention detectable MAC for low duty-cycled wireless sensor networks. SECON, pp. 37\u201345 (2015)","DOI":"10.1109\/SAHCN.2015.7338289"},{"key":"12_CR21","unstructured":"Cai, S., Jiao, X., Song, B.: Opening another door to education\u2014\u2014applications, challenges and prospects of the educational metaverse. Mod. Educ. Technol. 32(01), 16\u201326 (2022)"},{"key":"12_CR22","doi-asserted-by":"crossref","unstructured":"Pu, Q., Wang, X.: Metaverse and its influence and change on human society. J. Chongqing Univ. (Soc. Sci. Edit.) 1\u201312 (2022)","DOI":"10.54517\/m.v3i1.1796"},{"key":"12_CR23","doi-asserted-by":"crossref","unstructured":"Vallor, S.: Technology and the Virtues: a Philosophical Guide to a Future Worth Wanting. Oxford University Press, Oxford (2016)","DOI":"10.1093\/acprof:oso\/9780190498511.001.0001"},{"key":"12_CR24","unstructured":"Lanier, J.: Ten Arguments for Deleting Your Social Media Accounts Right Now. Random House, New York (2018)"},{"key":"12_CR25","doi-asserted-by":"crossref","unstructured":"Flintham, M., Karner, C., Bachour, K., Creswick, H., Gupta, N., Moran, S.: Falling for fake news: investigating the consumption of news via social media. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, p. 376. ACM (2018)","DOI":"10.1145\/3173574.3173950"},{"key":"12_CR26","unstructured":"Buck, L., McDonnell, R.: Security and privacy in the metaverse: the threat of the digital human. In: Proceedings of the 1st Workshop on Novel Challenges of Safety, Security and Privacy in Extended Reality (2022)"},{"key":"12_CR27","doi-asserted-by":"crossref","unstructured":"Shahriari, K., Shahriari, M.: IEEE standard review\u2014ethically aligned design: a vision for prioritizing human wellbeing with artificial intelligence and autonomous systems. In: 2017 IEEE Canada International Humanitarian Technology Conference (IHTC), pp. 197\u2013201. IEEE (2017)","DOI":"10.1109\/IHTC.2017.8058187"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Wireless Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-58053-6_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,19]],"date-time":"2024-05-19T20:26:45Z","timestamp":1716150405000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-58053-6_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031580529","9783031580536"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-58053-6_12","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"value":"1867-8211","type":"print"},{"value":"1867-822X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"20 May 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WiCON","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Wireless Internet Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Athens","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 December 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 December 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wicon2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/wicon2023.eai-conferences.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EAI Confy +","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"35","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"14","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"40% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}