<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1990-8644</journal-id>
<journal-title><![CDATA[Conrado]]></journal-title>
<abbrev-journal-title><![CDATA[Conrado]]></abbrev-journal-title>
<issn>1990-8644</issn>
<publisher>
<publisher-name><![CDATA[Editorial Universo Sur]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1990-86442023000100320</article-id>
<title-group>
<article-title xml:lang="es"><![CDATA[Arquitectura de un mecanismo de autenticación seguro para el metaverso en un ecosistema educativo]]></article-title>
<article-title xml:lang="en"><![CDATA[Architecture of a secure authentication mechanism for the metaverse in an educational ecosystem]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Guun-Yoo]]></surname>
<given-names><![CDATA[Sang]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Ortega-Castro]]></surname>
<given-names><![CDATA[Juan-Carlos]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Campaña-Ortega]]></surname>
<given-names><![CDATA[Eduardo Mauricio]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Universidad Católica de Cuenca  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Ecuador</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>02</month>
<year>2023</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>02</month>
<year>2023</year>
</pub-date>
<volume>19</volume>
<numero>90</numero>
<fpage>320</fpage>
<lpage>325</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://scielo.sld.cu/scielo.php?script=sci_arttext&amp;pid=S1990-86442023000100320&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://scielo.sld.cu/scielo.php?script=sci_abstract&amp;pid=S1990-86442023000100320&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://scielo.sld.cu/scielo.php?script=sci_pdf&amp;pid=S1990-86442023000100320&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="es"><p><![CDATA[RESUMEN El Metaverso es una nueva tecnología que está evolucionando rápidamente en el mundo de Internet y la educación. Este servicio implica otras tecnologías novedosas como blockchain, criptomoneda, realidad virtual, avatares, gestión del conocimiento, etc., y esta situación hace necesaria la implementación de un nuevo mecanismo de seguridad que incluya un mecanismo evolucionado de autenticación de usuarios. En esta situación, este trabajo propone una nueva arquitectura, desde la educación digital, de un mecanismo de autenticación seguro para el Metaverso que incluye características de privacidad, anonimato y flexibilidad de implementación. La arquitectura propuesta incluye el servicio tradicional de infra-estructura de clave pública para permitir la facilidad de implementación, al tiempo que añade una solución de certificado pseudo-digital para permitir a los usuarios mantener el anonimato y la privacidad en los mundos virtuales del Metaverso.]]></p></abstract>
<abstract abstract-type="short" xml:lang="en"><p><![CDATA[ABSTRACT Metaverse is a new technology which is evolving rapidly in the world of Internet and education. This service involves other novel technologies such as blockchain, cryptocurrency, virtual reality, avatars, knowledge management, etc., and this situation makes it necessary the implementation of new security mechanism including an evolved user authentication mechanism. In this situation, this work proposes a new architecture, from digital education, of a secure authentication mecha-nism for the metaverse including features of privacy, anonymity and flexibility of implementation. The proposed architecture includes the traditional public key infra-structure service for allowing easiness for implementation while adding a solution of a pseudo digital certificate for allowing users to maintain anonymity and privacy in the virtual worlds of the metaverse.]]></p></abstract>
<kwd-group>
<kwd lng="es"><![CDATA[Metaverso]]></kwd>
<kwd lng="es"><![CDATA[Educación digital]]></kwd>
<kwd lng="es"><![CDATA[Autenticación]]></kwd>
<kwd lng="es"><![CDATA[Conocimiento]]></kwd>
<kwd lng="es"><![CDATA[Certificado digital]]></kwd>
<kwd lng="en"><![CDATA[Metaverse]]></kwd>
<kwd lng="en"><![CDATA[Digital education]]></kwd>
<kwd lng="en"><![CDATA[Authentication]]></kwd>
<kwd lng="en"><![CDATA[Knowledge]]></kwd>
<kwd lng="en"><![CDATA[Digital certificate]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[De Jong]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<source><![CDATA[The Political Economy of the Metaverse]]></source>
<year>2022</year>
</nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Drummond]]></surname>
<given-names><![CDATA[J. S.]]></given-names>
</name>
<name>
<surname><![CDATA[Themessl-Huber]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The cyclical process of action research: The contribution of Gilles Deleuze]]></article-title>
<source><![CDATA[Action Research]]></source>
<year>2007</year>
<volume>5</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>430-48</page-range></nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Falchuk]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Loeb]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Neff]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The social metaverse: Battle for privacy]]></article-title>
<source><![CDATA[IEEE Technology and Society Magazine]]></source>
<year>2018</year>
<volume>37</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>52-61</page-range></nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fan]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[Y]]></given-names>
</name>
</person-group>
<source><![CDATA[Security analysis of the kerberos protocol using BAN logic]]></source>
<year>2009</year>
<conf-name><![CDATA[ FifthInternational Conference on Information Assurance and Security]]></conf-name>
<conf-loc> </conf-loc>
<page-range>467-70</page-range></nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Goldman Sachs]]></surname>
<given-names><![CDATA[LLC.]]></given-names>
</name>
</person-group>
<source><![CDATA[Overview of Digital Assets and Blockchain]]></source>
<year>2021</year>
</nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hardt]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<source><![CDATA[The OAuth 2.0 authorization framework]]></source>
<year>2012</year>
</nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Peng]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Obaidat]]></surname>
<given-names><![CDATA[M. S.]]></given-names>
</name>
<name>
<surname><![CDATA[Wu]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Khan]]></surname>
<given-names><![CDATA[M. K.]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A secure three-factor user authentication protocol with forward secrecy for wireless medical sensor network systems.]]></article-title>
<source><![CDATA[IEEE Systems Journal]]></source>
<year>2019</year>
<volume>14</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>39-50</page-range></nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mystakidis]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Metaverse]]></article-title>
<source><![CDATA[Encyclopedia]]></source>
<year>2022</year>
<volume>2</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>486-97</page-range></nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Nguyen]]></surname>
<given-names><![CDATA[C. T.]]></given-names>
</name>
<name>
<surname><![CDATA[Hoang]]></surname>
<given-names><![CDATA[D. T.]]></given-names>
</name>
<name>
<surname><![CDATA[Nguyen]]></surname>
<given-names><![CDATA[D. N.]]></given-names>
</name>
<name>
<surname><![CDATA[Dutkiewicz]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<source><![CDATA[Metachain: A novel blockchain-based framework for metaverse applications]]></source>
<year>2022</year>
</nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Recordon]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Reed]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<source><![CDATA[OpenID 2.0: a platform for user-centric identity management]]></source>
<year>2006</year>
<conf-name><![CDATA[ SecondACM Workshop on Digital Identity Management]]></conf-name>
<conf-loc> </conf-loc>
</nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Vidal-Tomás]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The new crypto niche: NFTs, play-to-earn, and metaverse tokens]]></article-title>
<source><![CDATA[Finance Research Letters]]></source>
<year>2022</year>
<volume>47</volume>
</nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Kumar]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Human Identification in Metaverse Using Egocentric Iris Recognition]]></source>
<year>2022</year>
</nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Su]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Xing]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Luan]]></surname>
<given-names><![CDATA[T. H.]]></given-names>
</name>
<name>
<surname><![CDATA[Shen]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
</person-group>
<source><![CDATA[A Survey on Metaverse: Fundamentals, Security, and Privacy]]></source>
<year>2022</year>
</nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[Q.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhao]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Huang]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Xiong]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Kang]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Zheng]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Fusing blockchain and AI with metaverse: A survey]]></article-title>
<source><![CDATA[IEEE Open Journal of the Computer Society]]></source>
<year>2022</year>
<volume>3</volume>
<page-range>122-36</page-range></nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Huang]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Yin]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Huang]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Chai]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Xing]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Wu]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhao]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Llakep: A low-latency authentication and key exchange protocol for energy internet of things in the metaverse era]]></article-title>
<source><![CDATA[Mathematics]]></source>
<year>2022</year>
<volume>10</volume>
<numero>14</numero>
<issue>14</issue>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
