2021 7th International Conference on Systems and Informatics (ICSAI) 2021
DOI: 10.1109/icsai53574.2021.9664176
|View full text |Cite
|
Sign up to set email alerts
|

A trust module for the interaction with virtual characters

Abstract: This paper describes the architecture of a trust module for the interaction between human users and virtual characters. The module is part of a bigger project whose goal is that of creating virtual and truly realistic characters capable of interacting with human users. An example of such a virtual character is a computer rendered museum clerk that interacts with visitors. The role of the security module in the envisioned scenarios is that of providing trust, mainly regarding the identity of the human user, but… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(6 citation statements)
references
References 2 publications
0
6
0
Order By: Relevance
“…Following the Self-Sovereign paradigm, the digital identity of the user is kept in a digital and private wallet. To this end, the DSMAC framework includes a component which is a mobile app through which the user can manage the wallet and at the same time he can interact with the security of medical data using an encryption scheme and the user's SSI wallet [59]. For this purpose, a ZKP cryptography technique is adopted to address specific requirements focusing on data privacy A ZKP is a kind of cryptographic method, and its use in blockchain appears to be promising in cases where existing blockchain technologies can.…”
Section: ) Outsourcing Encryption Approachmentioning
confidence: 99%
See 4 more Smart Citations
“…Following the Self-Sovereign paradigm, the digital identity of the user is kept in a digital and private wallet. To this end, the DSMAC framework includes a component which is a mobile app through which the user can manage the wallet and at the same time he can interact with the security of medical data using an encryption scheme and the user's SSI wallet [59]. For this purpose, a ZKP cryptography technique is adopted to address specific requirements focusing on data privacy A ZKP is a kind of cryptographic method, and its use in blockchain appears to be promising in cases where existing blockchain technologies can.…”
Section: ) Outsourcing Encryption Approachmentioning
confidence: 99%
“…To connect to the Indy network and control different nodes, we have utilized the Admin UI from the VON network repository [59]. It initiates the blockchain with the genesis block, a server, and 04 nodes.…”
Section: A Experimental Setupmentioning
confidence: 99%
See 3 more Smart Citations