{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T15:54:09Z","timestamp":1746114849163},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,11,19]],"date-time":"2023-11-19T00:00:00Z","timestamp":1700352000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,11,19]],"date-time":"2023-11-19T00:00:00Z","timestamp":1700352000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,11,19]]},"DOI":"10.1109\/gem59776.2023.10390314","type":"proceedings-article","created":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T18:28:54Z","timestamp":1705948134000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["3DK-Reate: Create Your Own 3D Key for Distributed Authentication in the Metaverse"],"prefix":"10.1109","author":[{"given":"Federico","family":"de Lorenzis","sequence":"first","affiliation":[{"name":"Politecnico di Torino,DAUIN,Turin,Italy"}]},{"given":"Alessandro","family":"Visconti","sequence":"additional","affiliation":[{"name":"Politecnico di Torino,DAUIN,Turin,Italy"}]},{"given":"Martina","family":"Marani","sequence":"additional","affiliation":[{"name":"Politecnico di Torino,Turin,Italy"}]},{"given":"Erik","family":"Prifti","sequence":"additional","affiliation":[{"name":"Politecnico di Torino,Turin,Italy"}]},{"given":"Camilla","family":"Andiloro","sequence":"additional","affiliation":[{"name":"Politecnico di Torino,Turin,Italy"}]},{"given":"Alberto","family":"Cannav\u00f2","sequence":"additional","affiliation":[{"name":"Politecnico di Torino,DAUIN,Turin,Italy"}]},{"given":"Fabrizio","family":"Lamberti","sequence":"additional","affiliation":[{"name":"Politecnico di Torino,DAUIN,Turin,Italy"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3202047"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3241809"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1002\/cav.2188"},{"key":"ref4","article-title":"Security considerations for virtual reality systems","author":"Viswanathan","year":"2022","journal-title":"arXiv preprint"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3428121"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833742"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174221"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240758"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/APCCAS.2016.7804002"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/VRW58643.2023.00313"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/VRW58643.2023.00320"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/VRW58643.2023.00314"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/VRW58643.2023.00312"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/VRW58643.2023.00311"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3206457"},{"key":"ref16","article-title":"Security of virtual reality authentication methods in metaverse: An overview","author":"K\u00fcrt\u00fcnl\u00fco\u011flu","year":"2022","journal-title":"arXiv preprint"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3517745.3561417"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1163\/23644583-bja10023"},{"key":"ref19","article-title":"Cryptography based authentication methods","volume-title":"Proc. World Congress on Engineering and Computer Science","author":"Alia","year":"2014"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCE.2014.7086640"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.01.033"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/s0166-4115(08)62386-9"}],"event":{"name":"2023 IEEE Gaming, Entertainment, and Media Conference (GEM)","start":{"date-parts":[[2023,11,19]]},"location":"Bridgetown, Barbados","end":{"date-parts":[[2023,11,22]]}},"container-title":["2023 IEEE Gaming, Entertainment, and Media Conference (GEM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10389809\/10389828\/10390314.pdf?arnumber=10390314","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T03:09:00Z","timestamp":1706756940000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10390314\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,19]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/gem59776.2023.10390314","relation":{},"subject":[],"published":{"date-parts":[[2023,11,19]]}}}