{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T01:18:54Z","timestamp":1775179134704,"version":"3.50.1"},"reference-count":177,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"publisher","award":["U20A20175"],"award-info":[{"award-number":["U20A20175"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"publisher","award":["U1808207"],"award-info":[{"award-number":["U1808207"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Surv. Tutorials"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/comst.2022.3202047","type":"journal-article","created":{"date-parts":[[2022,9,7]],"date-time":"2022-09-07T15:27:22Z","timestamp":1662564442000},"page":"319-352","source":"Crossref","is-referenced-by-count":1039,"title":["A Survey on Metaverse: Fundamentals, Security, and Privacy"],"prefix":"10.1109","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3810-7076","authenticated-orcid":false,"given":"Yuntao","family":"Wang","sequence":"first","affiliation":[{"name":"School of Cyber Science and Engineering, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6518-3130","authenticated-orcid":false,"given":"Zhou","family":"Su","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8781-4925","authenticated-orcid":false,"given":"Ning","family":"Zhang","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Windsor, Windsor, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8550-9698","authenticated-orcid":false,"given":"Rui","family":"Xing","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2595-6757","authenticated-orcid":false,"given":"Dongxiao","family":"Liu","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5215-7443","authenticated-orcid":false,"given":"Tom H.","family":"Luan","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4140-287X","authenticated-orcid":false,"given":"Xuemin","family":"Shen","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, Canada"}]}],"member":"263","reference":[{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3043802"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155526"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TMSCS.2015.2498605"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/TSUSC.2018.2808455"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.10.008"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3014646"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2828306"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3068307"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2018.2879929"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2017.4180835"},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1109\/MTS.2018.2826080"},{"key":"ref177","article-title":"Testimonium: A cost-efficient blockchain relay","author":"frauenthaler","year":"2020","journal-title":"arXiv 2002 12837"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2768020"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.1900367"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2914359"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3144219"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2205568"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2838569"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2576898"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.916010"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45855.2022.9838736"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00093"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.135"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2787986"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3015432"},{"key":"ref41","year":"2022","journal-title":"Meet the MetaHuman"},{"key":"ref44","year":"2022","journal-title":"NFT investors lose $1 7m in OpenSea phishing attack"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.3011208"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3112537"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3474085.3479238"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/OJCS.2022.3188249"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.018.2100716"},{"key":"ref4","article-title":"A survey on metaverse: the state-of-the-art, technologies, applications, and challenges","author":"ning","year":"2021","journal-title":"arXiv 2111 09673"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29387-1_24"},{"key":"ref6","article-title":"All one needs to know about metaverse: A complete survey on technological singularity, virtual ecosystem, and research agenda","author":"lee","year":"2021","journal-title":"arXiv 2110 05352"},{"key":"ref5","article-title":"The metaverse: Web3.0 virtual cloud economies","author":"grider","year":"2021"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/GEM.2018.8516484"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488776"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3161570"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3131711"},{"key":"ref34","article-title":"Optimal targeted advertising strategy for secure wireless edge metaverse","author":"du","year":"2021","journal-title":"arXiv 2111 00511"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.021312.00018"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE-Taiwan49838.2020.9258002"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-8979-9_7"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2907658"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2010.5606335"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3131744"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3079510"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45855.2022.9838492"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/769953.769967"},{"key":"ref147","article-title":"Reliable coded distributed computing for metaverse services: Coalition formation and incentive mechanism design","author":"jiang","year":"2021","journal-title":"arXiv 2111 10548"},{"key":"ref39","first-page":"27","article-title":"Analysis of metaverse platform as a new play culture: Focusing on Roblox and ZEPETO","author":"han","year":"2021","journal-title":"Proc Int Conf Human-Centered Artif Intell"},{"key":"ref38","article-title":"Non-fungible token (NFT): Overview, evaluation, opportunities and challenges","author":"wang","year":"2021","journal-title":"arXiv 2105 07447"},{"key":"ref155","article-title":"Modeling and defense of social virtual reality attacks inducing cybersickness","author":"valluripally","year":"2021","journal-title":"IEEE Trans Depend Secure Comput"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2020.2997188"},{"key":"ref153","year":"2022","journal-title":"Metaverse rollout brings new security risks challenges"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2014.2372315"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2959013"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2907942"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2019.2959230"},{"key":"ref24","year":"2021","journal-title":"IEEE 2888 standards"},{"key":"ref23","year":"2021","journal-title":"ISO\/IEC 23005 (MPEG-V) standards"},{"key":"ref26","article-title":"Being an avatar &#x201C;for real&#x201D;: A survey on virtual embodiment in augmented reality","author":"genay","year":"2021","journal-title":"IEEE Trans Vis Comput Graphics"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/VSMM.2016.7863165"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s10660-009-9030-8"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2018.2876846"},{"key":"ref22","article-title":"When creators meet the metaverse: A survey on computational arts","author":"lee","year":"2021","journal-title":"arXiv 2111 13486"},{"key":"ref157","year":"2022","journal-title":"The metaverse offers a future full of potential&#x2013;For terrorists and extremists too"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"94","DOI":"10.3991\/ijet.v15i22.14393","article-title":"Virtual world as a resource for hybrid education","volume":"15","author":"d\u00edaz","year":"2020","journal-title":"Int J Emerg Technol Learn"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2021.3078730"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2008.398"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2020.3018159"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TSUSC.2018.2839623"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2019.00166"},{"key":"ref167","first-page":"2193","article-title":"Toward vehicular digital forensics from decentralized trust: An accountable, privacy-preserving, and secure realization","volume":"18","author":"li","year":"2021","journal-title":"IEEE Internet of Things Journal"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3091151"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2970495"},{"key":"ref162","year":"2021","journal-title":"Improving user experience in our transfer your information tool"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2021.3057756"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2017.2744645"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2022.3145165"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.3007740"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MTS.2018.2826060"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1002\/cav.1752"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2014.012114.121317"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218444"},{"key":"ref129","doi-asserted-by":"crossref","first-page":"954","DOI":"10.1109\/TPDS.2007.70783","article-title":"Free-riding on BitTorrent-like peer-to-peer file sharing systems: Modeling analysis and improvement","volume":"19","author":"li","year":"2008","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.75"},{"key":"ref126","year":"2021","journal-title":"Don&#x2019;t get rugged DeFi scams go from zero to $129 million in a year to become top financial hack"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2016.2575825"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2021.3056490"},{"key":"ref11","first-page":"95","article-title":"Privacy in the metaverse: Regulating a complex social construct in a virtual world","author":"leenes","year":"2008","journal-title":"Proc Future Identity Inf Soc"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2016.87"},{"key":"ref124","year":"2022","journal-title":"Hackers exploited reentrancy vulnerability to attack Paraluni making more than $1 7 million"},{"key":"ref10","year":"2021","journal-title":"Rebrands as Meta to stress &#x2018;metaverse&#x2019; plan"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00051"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2837648"},{"key":"ref17","article-title":"Artificial intelligence for the metaverse: A survey","author":"huynh-the","year":"2022","journal-title":"arXiv 2202 10336"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2022-Spring54318.2022.9860983"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3221119"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3140175"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.62"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3126207"},{"key":"ref92","year":"2022","journal-title":"General Data Protection Regulation (GDPR)"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2011.57"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2959911"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2886069"},{"key":"ref94","year":"2021","journal-title":"Metaverse Breached Second Life Customer Database Hacked"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2877634"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2019.2948861"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3110808"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2008.74"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3026366"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2875910"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2764259"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2021.3138928"},{"key":"ref85","first-page":"2543","article-title":"AdCube: WebVR ad fraud and practical confinement of Third-Party ads","author":"lee","year":"2021","journal-title":"Proc 30th USENIX Security Symp (USENIX Security)"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3059345"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2850821"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2013.150"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2016.2575064"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2016.2605939"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3095506"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2144584"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2980823"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2021.3052873"},{"key":"ref84","first-page":"141","article-title":"Secure multi-user content sharing for augmented reality applications","author":"ruth","year":"2019","journal-title":"Proc 28th USENIX Security Symp (USENIX Security)"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2006.882904"},{"key":"ref83","article-title":"A dynamic hierarchical framework for IoT-assisted digital twin synchronization in the metaverse","author":"han","year":"2022","journal-title":"IEEE Internet of Things Journal"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2015.2489198"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2017.2685560"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2940148"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445401"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/I3DA48870.2021.9610971"},{"key":"ref108","year":"2022","journal-title":"The Privacy Sandbox"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1145\/1459359.1459400"},{"key":"ref109","year":"2022","journal-title":"Learning With Privacy at Scale"},{"key":"ref106","year":"2021","journal-title":"The metaverse has a groping problem already (MIT technology review)"},{"key":"ref107","year":"2022","journal-title":"Meta establishes 4-foot &#x201C;personal boundary&#x201D; to deter VR groping"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.6047"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.16"},{"key":"ref74","first-page":"1","article-title":"Modality to modality translation: An adversarial representation learning and graph fusion network for multimodal fusion","author":"mai","year":"2019","journal-title":"Proc AAAI"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2021.3098467"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2938885"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3025129"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00126"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2443795"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2480741.2480751"},{"key":"ref1","first-page":"1240","article-title":"Second life: An interactive qualitative analysis","author":"sanchez","year":"2007","journal-title":"Proc Soc Inf Technol Teach Educ Int Conf"},{"key":"ref71","year":"2020","journal-title":"The right of publicity Likeness lawsuits against video game companies"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2022.3141585"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2008.1"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.3035374"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2018.2858821"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3122566"},{"key":"ref110","year":"2022","journal-title":"Key infrastructure of the metaverse status opportunities and challenges of NFT data storage"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2016.2631891"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.2986621"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.2980255"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3047675"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2017.8"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2018.07.023"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3040171"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/TBCAS.2013.2245664"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2864748"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3042049"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2018.2851446"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3004469"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2593898"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2020.3013416"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.2980916"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2956173"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2016.2616146"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2016.2535728"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2019.2898676"},{"key":"ref61","article-title":"XAuth: Efficient privacy-preserving cross-domain authentication","author":"chen","year":"2021","journal-title":"IEEE Trans Depend Secure Comput"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3113577"}],"container-title":["IEEE Communications Surveys &amp; Tutorials"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9739\/10051138\/09880528.pdf?arnumber=9880528","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,20]],"date-time":"2023-03-20T14:12:44Z","timestamp":1679321564000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9880528\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":177,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/comst.2022.3202047","relation":{"has-preprint":[{"id-type":"doi","id":"10.36227\/techrxiv.19255058.v3","asserted-by":"object"},{"id-type":"doi","id":"10.36227\/techrxiv.19255058.v1","asserted-by":"object"},{"id-type":"doi","id":"10.36227\/techrxiv.19255058.v2","asserted-by":"object"},{"id-type":"doi","id":"10.36227\/techrxiv.19255058","asserted-by":"object"}]},"ISSN":["1553-877X","2373-745X"],"issn-type":[{"value":"1553-877X","type":"electronic"},{"value":"2373-745X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}