Browse > Article

메타버스의 진화에 따른 ID 관리 기술 현황  

Jeong, Soo Yong (공주대학교 융합과학과)
Seo, Chang Ho (공주대학교 융합과학과)
CHO, in-Man (한국전자통신연구원)
Jin, Seung-Hun (한국전자통신연구원)
Kim, Soo Hyung (한국전자통신연구원)
Keywords
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 Lee, Lik-Hang, et al. "All one needs to know about metaverse: A complete survey on technological singularity, virtual ecosystem, and research agenda." arXiv preprint arXiv:2110.05352 (2021).
2 Park, Sang-Min, and Young-Gab Kim. "A Metaverse: Taxonomy, components, applications, and open challenges." Ieee Access 10 (2022): 4209-4251.   DOI
3 Bethencourt, John, Amit Sahai, and Brent Waters. "Ciphertext-policy attribute-based encryption." 2007 IEEE symposium on security and privacy (SP'07). IEEE, 2007.
4 Wei, Jianhao, et al. "LDP-based social content protection for trending topic recommendation." IEEE Internet of Things Journal 8.6 (2020): 4353-4372.
5 Wang, Yuntao, et al. "A survey on metaverse: Fundamentals, security, and privacy." arXiv preprint arXiv:2203.02662 (2022).
6 Yang, Qinglin, et al. "Fusing blockchain and AI with metaverse: A survey." IEEE Open Journal of the Computer Society (2022).
7 Di Pietro, Roberto, and Stefano Cresci. "Metaverse: Security and Privacy Issues." 2021 Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA). IEEE, 2021.
8 Antonioli, Daniele, Nils Ole Tippenhauer, and Kasper Rasmussen. "BIAS: bluetooth impersonation attacks." 2020 IEEE Symposium on Security and Privacy (SP). IEEE, 2020.
9 Han, Jinsoo, et al. "User-friendly home automation based on 3D virtual world." IEEE Transactions on consumer electronics 56.3 (2010): 1843-1847.   DOI
10 Dionisio, John David N., William G. Burns III, and Richard Gilbert. "3D virtual worlds and the metaverse: Current status and future possibilities." ACM Computing Surveys (CSUR) 45.3 (2013): 1-38.
11 Lee, Lik Hang, et al. "Hibey: Hide the keyboard in augmented reality." 2019 IEEE International Conference on Pervasive Computing and Communications (PerCom. IEEE, 2019.
12 Hartmann, Jeremy, Yen-Ting Yeh, and Daniel Vogel. "AAR: Augmenting a wearable augmented reality display with an actuated head-mounted projector." Proceedings of the 33rd Annual ACM Symposium on User Interface Software and Technology. 2020.
13 Far, Saeed Banaeian, and Azadeh Imani Rad. "Applying Digital Twins in Metaverse: User Interface, Security and Privacy Challenges." Journal of Metaverse 2.1 (2022): 8-16.
14 Giaretta, Alberto. "Security and Privacy in Virtual Reality-A Literature Survey." arXiv preprint arXiv:2205.00208 (2022).
15 Huynh-The, Thien, et al. "Artificial Intelligence for the Metaverse: A Survey." arXiv preprint arXiv:2202.10336 (2022).
16 Kilger, Fabian, et al. "Detecting and Preventing Faked Mixed Reality." 2021 IEEE 4th International Conference on Multimedia Information Processing and Retrieval (MIPR). IEEE, 2021.
17 Zuckerberg, Mark, and Gayle King. "Facebook launches" Horizon Workrooms. "Here's how it works." (2021).
18 Ning, Huansheng, et al. "A Survey on Metaverse: the State-of-the-art, Technologies, Applications, and Challenges." arXiv preprint arXiv:2111.09673 (2021).
19 Zhernova, Ksenia, and Andrey Chechulin. "Overview of vulnerabilities of decision support interfaces based on virtual and augmented reality technologies." International Conference on Intelligent Information Technologies for Industry. Springer, Cham, 2021.
20 Dwork, Cynthia, et al. "Calibrating noise to sensitivity in private data analysis." Theory of cryptography conference. Springer, Berlin, Heidelberg, 2006.
21 Erlingsson, Ulfar, Vasyl Pihur, and Aleksandra Korolova. "Rappor: Randomized aggregatable privacy-preserving ordinal response." Proceedings of the 2014 ACM SIGSAC conference on computer and communications security. 2014.
22 Xu, Kaihe, et al. "My privacy my decision: Control of photo sharing on online social networks." IEEE Transactions on Dependable and Secure Computing 14.2 (2015): 199-210.   DOI
23 Fromknecht, Conner, Dragos Velicanu, and Sophia Yakoubov. "A decentralized public key infrastructure with identity retention." Cryptology ePrint Archive (2014).
24 Chen, Jing, et al. "XAuth: Efficient privacy-preserving cross-domain authentication." IEEE Transactions on Dependable and Secure Computing (2021).
25 Casey, Peter, Ibrahim Baggili, and Ananya Yarramreddy. "Immersive virtual reality attacks and the human joystick." IEEE Transactions on Dependable and Secure Computing 18.2 (2019): 550-562.
26 XR Safety Initiative. "The XRSI Privacy Framework version 1.0." 0) (2020).
27 데이터넷관리자, "개인정보 유출 위해 데스크톱 노린 공격 심화", IT정보마당 데이터넷, 2006.11.24.
28 "악성코드는 '디아블로3'를 타고?..게임계정 탈취 급증", 아주경제, 2012.07.15.
29 금융보안원 보안연구부 보안기술팀, "바이오정보 사고사례 및 대응방안 조사", 금융보안원, 2016.03.04.
30 Srinivas, Jangirala, et al. "Cloud centric authentication for wearable healthcare monitoring system." IEEE Transactions on Dependable and Secure Computing 17.5 (2018): 942-956.   DOI
31 Zhao, Tianming, et al. "Trueheart: Continuous authentication on wrist-worn wearables using ppg-based biometrics." IEEE INFOCOM 2020-IEEE Conference on Computer Communications. IEEE, 2020.
32 닐 스티븐슨, 김장환 역, 「스노우 크래쉬」, 새와 물고기, 1996
33 Jeong, Soo Yong, et al. "확장된 가상현실인 메타버스에서의 보안 위협 분석." Review of KIISC 31.6 (2021): 47-57.
34 John S., Jamais C., Jerry P., Corey B., Jochen H., James H., and Randal M. (2007) "Metaverse Roadmap", ASF
35 Meier, Manuel, et al. "TapID: Rapid touch interaction in virtual reality using wearable sensing." 2021 IEEE Virtual Reality and 3D User Interfaces (VR). IEEE, 2021.
36 Park, Sebeom, Shokhrukh Bokijonov, and Yosoon Choi. "Review of microsoft hololens applications over the past five years." Applied Sciences 11.16 (2021): 7259.
37 Happa, Jassim, Mashhuda Glencross, and Anthony Steed. "Cyber security threats and challenges in collaborative mixed-reality." Frontiers in ICT 6 (2019): 5.
38 고준영, and 이근호. "M2M 환경에서의 SNS 개인정보 유출 위협 및 대응방안." 한국융합학회논문지 5.1 (2014): 29-34.   DOI
39 Shang, Jiacheng, et al. "ARSpy: Breaking location-based multi-player augmented reality application for user location tracking." IEEE Transactions on Mobile Computing (2020).
40 정성호, "인기 블록체인 게임서 대규모 해킹...7천 500억원 상당 탈취", 연합뉴스, 2022.03.30.
41 Zhao, Ruoyu, et al. "Metaverse: Security and Privacy Concerns." arXiv preprint arXiv:2203.03854 (2022).
42 Liu, Hong, et al. "Cooperative privacy preservation for wearable devices in hybrid computing-based smart health." IEEE Internet of Things Journal 6.2 (2018): 1352-1362.   DOI