{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T09:53:18Z","timestamp":1767865998259,"version":"3.49.0"},"reference-count":53,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2018,1,29]],"date-time":"2018-01-29T00:00:00Z","timestamp":1517184000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001798","name":"Edith Cowan University","doi-asserted-by":"publisher","award":["G1003411"],"award-info":[{"award-number":["G1003411"]}],"id":[{"id":"10.13039\/501100001798","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008812","name":"Defence Science and Technology Group","doi-asserted-by":"publisher","award":["CERA 221"],"award-info":[{"award-number":["CERA 221"]}],"id":[{"id":"10.13039\/501100008812","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1007\/s11227-018-2266-0","type":"journal-article","created":{"date-parts":[[2018,1,29]],"date-time":"2018-01-29T13:43:18Z","timestamp":1517233398000},"page":"4893-4909","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":25,"title":["ECB4CI: an enhanced cancelable biometric system for securing critical infrastructures"],"prefix":"10.1007","volume":"74","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7800-2215","authenticated-orcid":false,"given":"Wencheng","family":"Yang","sequence":"first","affiliation":[]},{"given":"Song","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Guanglou","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Junaid","family":"Chaudhry","sequence":"additional","affiliation":[]},{"given":"Craig","family":"Valli","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,1,29]]},"reference":[{"issue":"6","key":"2266_CR1","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/37.969131","volume":"21","author":"SM Rinaldi","year":"2001","unstructured":"Rinaldi SM, Peerenboom JP, Kelly TK (2001) Identifying, understanding, and analyzing critical infrastructure interdependencies. IEEE Control Syst 21(6):11\u201325","journal-title":"IEEE Control Syst"},{"issue":"6","key":"2266_CR2","doi-asserted-by":"publisher","first-page":"530","DOI":"10.1287\/inte.1060.0252","volume":"36","author":"G Brown","year":"2006","unstructured":"Brown G, Carlyle M, Salmer\u00f3n J, Wood K (2006) Defending critical infrastructure. Interfaces 36(6):530\u2013544","journal-title":"Interfaces"},{"key":"2266_CR3","doi-asserted-by":"publisher","unstructured":"Yang W, Hu J, Yang J, Wang S, Shu L (2013) Biometrics for securing mobile payments: benefits, challenges and solutions. In: 2013 6th International Congress on Image and Signal Processing (CISP), 16\u201318 Dec 2013, pp 1699\u20131704. \n                    https:\/\/doi.org\/10.1109\/cisp.2013.6743950","DOI":"10.1109\/cisp.2013.6743950"},{"issue":"2","key":"2266_CR4","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/MSECP.2003.1193209","volume":"1","author":"S Prabhakar","year":"2003","unstructured":"Prabhakar S, Pankanti S, Jain AK (2003) Biometric recognition: security and privacy concerns. IEEE Secur Priv 1(2):33\u201342. \n                    https:\/\/doi.org\/10.1109\/MSECP.2003.1193209","journal-title":"IEEE Secur Priv"},{"issue":"1","key":"2266_CR5","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1109\/TIFS.2014.2363951","volume":"10","author":"K Cao","year":"2015","unstructured":"Cao K, Jain AK (2015) Learning fingerprint reconstruction: from minutiae to image. IEEE Trans Inf Forensics Secur 10(1):104\u2013117","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"2266_CR6","unstructured":"Scheirer WJ, Boult TE (2007) Cracking fuzzy vaults and biometric encryption. In: Biometrics Symposium, 2007. IEEE, pp 1\u20136"},{"key":"2266_CR7","doi-asserted-by":"crossref","unstructured":"Juels A, Wattenberg MA (1999) fuzzy commitment scheme. In: Proceedings of the 6th ACM Conference on Computer and Communications Security. ACM, pp 28\u201336","DOI":"10.1145\/319709.319714"},{"key":"2266_CR8","doi-asserted-by":"crossref","unstructured":"Uludag U, Pankanti S, Jain AK (2005) Fuzzy vault for fingerprints. In: Audio-and Video-Based Biometric Person Authentication. Springer, pp 310\u2013319","DOI":"10.1007\/11527923_32"},{"issue":"23","key":"2266_CR9","doi-asserted-by":"publisher","first-page":"724","DOI":"10.1587\/elex.4.724","volume":"4","author":"ABJ Teoh","year":"2007","unstructured":"Teoh ABJ, Kim J (2007) Secure biometric template protection in fuzzy commitment scheme. IEICE Electron Express 4(23):724\u2013730","journal-title":"IEICE Electron Express"},{"key":"2266_CR10","doi-asserted-by":"crossref","unstructured":"Zhou X, Kuijper A, Veldhuis R, Busch C (2011) Quantifying privacy and security of biometric fuzzy commitment. In: 2011 International Joint Conference on Biometrics (IJCB). IEEE, pp 1\u20138","DOI":"10.1109\/IJCB.2011.6117543"},{"issue":"1","key":"2266_CR11","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1109\/TIFS.2010.2091637","volume":"6","author":"EJC Kelkboom","year":"2011","unstructured":"Kelkboom EJC, Breebaart J, Kevenaar TAM, Buhan I, Veldhuis RNJ (2011) Preventing the decodability attack based cross-matching in a fuzzy commitment scheme. IEEE Trans Inf Forensics Secur 6(1):107\u2013121","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"2266_CR12","doi-asserted-by":"publisher","unstructured":"Yang W, Hu J, Wang SA (2013) Delaunay triangle group based fuzzy vault with cancellability. In: 2013 6th International Congress on Image and Signal Processing (CISP), 16\u201318 Dec 2013, pp 1676\u20131681. \n                    https:\/\/doi.org\/10.1109\/cisp.2013.6743946","DOI":"10.1109\/cisp.2013.6743946"},{"issue":"2","key":"2266_CR13","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/s10623-005-6343-z","volume":"38","author":"A Juels","year":"2006","unstructured":"Juels A, Sudan M (2006) A fuzzy vault scheme. Des Codes Cryptogr 38(2):237\u2013257","journal-title":"Des Codes Cryptogr"},{"key":"2266_CR14","doi-asserted-by":"crossref","unstructured":"Nagar A, Nandakumar K, Jain AK (2008) Securing fingerprint template: fuzzy vault with minutiae descriptors. In: 19th International Conference on Pattern Recognition. IEEE, pp 1\u20134","DOI":"10.1109\/ICPR.2008.4761459"},{"key":"2266_CR15","doi-asserted-by":"crossref","unstructured":"Narayanan R, Karthikeyan S (2012) Double encryption based secure fuzzy vault construction using fingerprint biometric features. In: 2012 International Conference on Pattern Recognition, Informatics and Medical Engineering (PRIME). IEEE, pp 178\u2013182","DOI":"10.1109\/ICPRIME.2012.6208339"},{"key":"2266_CR16","doi-asserted-by":"crossref","unstructured":"Tams B, Merkle J, Rathgeb C, Wagner J, Korte U, Busch C (2015) Improved fuzzy vault scheme for alignment-free fingerprint features. In: 2015 International Conference of the Biometrics Special Interest Group (BIOSIG). IEEE, pp 1\u201312","DOI":"10.1109\/BIOSIG.2015.7314608"},{"issue":"5","key":"2266_CR17","doi-asserted-by":"publisher","first-page":"985","DOI":"10.1109\/TIFS.2015.2392559","volume":"10","author":"B Tams","year":"2015","unstructured":"Tams B, Mih\u0103ilescu P, Munk A (2015) Security considerations in minutiae-based fuzzy vaults. IEEE Trans Inf Forensics Secur 10(5):985\u2013998","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"3","key":"2266_CR18","doi-asserted-by":"publisher","first-page":"543","DOI":"10.1109\/TIFS.2015.2505630","volume":"11","author":"C Li","year":"2016","unstructured":"Li C, Hu J (2016) A security-enhanced alignment-free fuzzy vault-based fingerprint cryptosystem using pair-polar minutiae structures. IEEE Trans Inf Forensics Secur 11(3):543\u2013555","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"2266_CR19","doi-asserted-by":"crossref","unstructured":"Neu M, Korte U, Ullmann M (2016) Improvement of fuzzy vault for multiple fingerprints with angles. In: 2016 International Conference of the Biometrics Special Interest Group (BIOSIG). IEEE, pp 1\u20138","DOI":"10.1109\/BIOSIG.2016.7736926"},{"issue":"3","key":"2266_CR20","doi-asserted-by":"publisher","first-page":"614","DOI":"10.1147\/sj.403.0614","volume":"40","author":"NK Ratha","year":"2001","unstructured":"Ratha NK, Connell JH, Bolle RM (2001) Enhancing security and privacy in biometrics-based authentication systems. IBM Syst J 40(3):614\u2013634","journal-title":"IBM Syst J"},{"issue":"4","key":"2266_CR21","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1109\/TPAMI.2007.1004","volume":"29","author":"NK Ratha","year":"2007","unstructured":"Ratha NK, Chikkerur S, Connell JH, Bolle RM (2007) Generating cancelable fingerprint templates. IEEE Trans Pattern Anal Mach Intell 29(4):561\u2013572","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"6","key":"2266_CR22","doi-asserted-by":"publisher","first-page":"2034","DOI":"10.1016\/j.patcog.2007.12.002","volume":"41","author":"ABJ Teoh","year":"2008","unstructured":"Teoh ABJ, Kuan YW, Lee S (2008) Cancellable biometrics and annotations on biohash. Pattern Recogn 41(6):2034\u20132044","journal-title":"Pattern Recogn"},{"key":"2266_CR23","unstructured":"Yang H, Jiang X, Kot AC (2009) Generating secure cancelable fingerprint templates using local and global features. In: 2nd IEEE International Conference on Computer Science and Information Technology, 2009. ICCSIT 2009. IEEE, pp 645\u2013649"},{"issue":"3","key":"2266_CR24","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1016\/j.jnca.2009.12.011","volume":"33","author":"C Lee","year":"2010","unstructured":"Lee C, Kim J (2010) Cancelable fingerprint templates using minutiae-based bit-strings. J Netw Comput Appl 33(3):236\u2013246","journal-title":"J Netw Comput Appl"},{"issue":"10","key":"2266_CR25","doi-asserted-by":"publisher","first-page":"2555","DOI":"10.1016\/j.patcog.2011.03.015","volume":"44","author":"T Ahmad","year":"2011","unstructured":"Ahmad T, Hu J, Wang S (2011) Pair-polar coordinate-based cancelable fingerprint templates. Pattern Recogn 44(10):2555\u20132564","journal-title":"Pattern Recogn"},{"key":"2266_CR26","doi-asserted-by":"publisher","first-page":"4129","DOI":"10.1016\/j.patcog.2012.05.004","volume":"45","author":"S Wang","year":"2012","unstructured":"Wang S, Hu J (2012) Alignment-free cancellable fingerprint template design: a densely infinite-to-one mapping (DITOM) approach. Pattern Recogn 45:4129\u20134137","journal-title":"Pattern Recogn"},{"issue":"3","key":"2266_CR27","doi-asserted-by":"publisher","first-page":"1321","DOI":"10.1016\/j.patcog.2013.10.003","volume":"47","author":"S Wang","year":"2014","unstructured":"Wang S, Hu J (2014) Design of alignment-free cancelable fingerprint templates via curtailed circular convolution. Pattern Recogn 47(3):1321\u20131329","journal-title":"Pattern Recogn"},{"key":"2266_CR28","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1016\/j.patcog.2016.08.017","volume":"61","author":"S Wang","year":"2017","unstructured":"Wang S, Deng G, Hu J (2017) A partial Hadamard transform approach to the design of cancelable fingerprint templates containing binary biometric representations. Pattern Recogn 61:447\u2013458","journal-title":"Pattern Recogn"},{"key":"2266_CR29","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1016\/j.patcog.2017.01.019","volume":"66","author":"S Wang","year":"2017","unstructured":"Wang S, Yang W, Hu J (2017) Design of alignment-free cancelable fingerprint templates with zoned minutia pairs. Pattern Recogn 66:295\u2013301","journal-title":"Pattern Recogn"},{"key":"2266_CR30","doi-asserted-by":"crossref","unstructured":"Quan F, Fei S, Anni C, Feifei Z (2008) Cracking cancelable fingerprint template of Ratha. In: International Symposium on Computer Science and Computational Technology, 2008. ISCSCT\u201908. IEEE, pp 572\u2013575","DOI":"10.1109\/ISCSCT.2008.226"},{"key":"2266_CR31","doi-asserted-by":"publisher","first-page":"1593","DOI":"10.1002\/cpe.3042","volume":"26","author":"C Li","year":"2013","unstructured":"Li C, Hu J (2013) Attacks via record multiplicity on cancelable biometrics templates. Pract Exp Concurr Comput 26:1593\u20131605","journal-title":"Pract Exp Concurr Comput"},{"key":"2266_CR32","doi-asserted-by":"crossref","unstructured":"Yang W, Hu J, Wang S (2014) The effect of spurious and missing minutiae on Delaunay triangulation based on its application to fingerprint authentication. In: 11th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD 2014), China, Xiamen, p 4","DOI":"10.1109\/FSKD.2014.6980975"},{"key":"2266_CR33","volume-title":"Advanced engineering mathematics","author":"E Kreyszig","year":"2010","unstructured":"Kreyszig E (2010) Advanced engineering mathematics. Wiley, New York"},{"issue":"9","key":"2266_CR34","doi-asserted-by":"publisher","first-page":"1063","DOI":"10.1109\/TPAMI.2003.1227983","volume":"25","author":"V Blanz","year":"2003","unstructured":"Blanz V, Vetter T (2003) Face recognition based on fitting a 3D morphable model. IEEE Trans Pattern Anal Mach Intell 25(9):1063\u20131074","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"4","key":"2266_CR35","doi-asserted-by":"publisher","first-page":"1002","DOI":"10.1109\/TPAMI.2017.2700390","volume":"40","author":"Changxing Ding","year":"2018","unstructured":"Ding C, Tao D (2017) Trunk-branch ensemble convolutional neural networks for video-based face recognition. IEEE Trans Pattern Anal Mach Intell. \n                    https:\/\/doi.org\/10.1109\/TPAMI.2017.2700390","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"issue":"3","key":"2266_CR36","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1007\/s13042-017-0723-3","volume":"10","author":"Sara Nazari","year":"2017","unstructured":"Nazari S, Moin M-S, Kanan HR (2017) A discriminant binarization transform using genetic algorithm and error-corecting output code for face template protection. Int J Mach Learn Cybern. \n                    https:\/\/doi.org\/10.1007\/s13042-017-0723-3","journal-title":"International Journal of Machine Learning and Cybernetics"},{"key":"2266_CR37","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/j.imavis.2016.07.008","volume":"58","author":"M Yang","year":"2017","unstructured":"Yang M, Wang X, Liu W, Shen L (2017) Joint regularized nearest points for image set based face recognition. Image Vis Comput 58:47\u201360","journal-title":"Image Vis Comput"},{"key":"2266_CR38","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1155\/2010\/847680","volume":"2010","author":"\u0160VN Pave\u0161i\u0107","year":"2010","unstructured":"Pave\u0161i\u0107 \u0160VN (2010) The complete gabor-fisher classifier for robust face recognition. EURASIP J Adv Signal Process 2010:26. \n                    https:\/\/doi.org\/10.1155\/2010\/847680","journal-title":"EURASIP J Adv Signal Process"},{"issue":"10","key":"2266_CR39","doi-asserted-by":"publisher","first-page":"2893","DOI":"10.1109\/TBME.2012.2212440","volume":"59","author":"F Riaz","year":"2012","unstructured":"Riaz F, Silva FB, Ribeiro MD, Coimbra MT (2012) Invariant gabor texture descriptors for classification of gastroenterology images. IEEE Trans Biomed Eng 59(10):2893\u20132904","journal-title":"IEEE Trans Biomed Eng"},{"key":"2266_CR40","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1016\/j.compbiomed.2017.07.002","volume":"88","author":"H Ali","year":"2017","unstructured":"Ali H, Sharif M, Yasmin M, Rehmani MH (2017) Computer-based classification of chromoendoscopy images using homogeneous texture descriptors. Comput Biol Med 88:84\u201392","journal-title":"Comput Biol Med"},{"issue":"11","key":"2266_CR41","doi-asserted-by":"publisher","first-page":"2245","DOI":"10.1016\/j.patcog.2004.04.011","volume":"37","author":"ATB Jin","year":"2004","unstructured":"Jin ATB, Ling DNC, Goh A (2004) Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recogn 37(11):2245\u20132255","journal-title":"Pattern Recogn"},{"key":"2266_CR42","unstructured":"Fingerprint Verification Competition (2002). \n                    http:\/\/bias.csr.unibo.it\/fvc2002"},{"key":"2266_CR43","unstructured":"Fingerprint Verification Competition (2004). \n                    http:\/\/bias.csr.unibo.it\/fvc2004"},{"issue":"6","key":"2266_CR44","doi-asserted-by":"publisher","first-page":"1097","DOI":"10.1109\/TPAMI.2009.76","volume":"32","author":"J Ortega-Garcia","year":"2010","unstructured":"Ortega-Garcia J, Fierrez J, Alonso-Fernandez F, Galbally J, Freire MR, Gonzalez-Rodriguez J, Garcia-Mateo C, Alba-Castro JL, Gonzalez-Agulla E, Otero-Muras E, Garcia-Salicetti S, Allano L, Ly-Van B, Dorizzi B, Kittler J, Bourlai T, Poh N, Deravi F, Ng MNR, Fairhurst M, Hennebert J, Humm A, Tistarelli M, Brodo L, Richiardi J, Drygajlo A, Ganster H, Sukno FM, Pavani SK, Frangi A, Akarun L, Savran A (2010) The multiscenario multienvironment biosecure multimodal database (BMDB). IEEE Trans Pattern Anal Mach Intell 32(6):1097\u20131111. \n                    https:\/\/doi.org\/10.1109\/TPAMI.2009.76","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"2266_CR45","unstructured":"Veri Finger SDK, Neuro Technology (2010). \n                    http:\/\/www.neurotechnology.com\/verifinger.html"},{"key":"2266_CR46","doi-asserted-by":"crossref","unstructured":"Yang W, Hu J, Stojmenovic M (2012) NDTC: a novel topology-based fingerprint matching algorithm using N-layer Delaunay triangulation net check. In: 2012 7th IEEE Conference on Industrial Electronics and Applications (ICIEA). IEEE, pp 866\u2013870","DOI":"10.1109\/ICIEA.2012.6360846"},{"issue":"16","key":"2266_CR47","doi-asserted-by":"publisher","first-page":"2427","DOI":"10.1016\/j.patrec.2007.08.008","volume":"28","author":"S Tulyakov","year":"2007","unstructured":"Tulyakov S, Farooq F, Mansukhani P, Govindaraju V (2007) Symmetric hash functions for secure fingerprint biometric systems. Pattern Recogn Lett 28(16):2427\u20132436","journal-title":"Pattern Recogn Lett"},{"key":"2266_CR48","doi-asserted-by":"publisher","first-page":"6157","DOI":"10.1016\/j.eswa.2011.11.091","volume":"39","author":"Z Jin","year":"2011","unstructured":"Jin Z, Jin Teoh AB, Ong TS, Tee C (2011) Fingerprint template protection with minutiae-based bit-string for security and privacy preserving. Expert Syst Appl 39:6157\u20136167","journal-title":"Expert Syst Appl"},{"issue":"9","key":"2266_CR49","doi-asserted-by":"publisher","first-page":"3373","DOI":"10.1016\/j.patcog.2012.02.022","volume":"45","author":"P Das","year":"2012","unstructured":"Das P, Karthik K, Chandra Garai B (2012) A robust alignment-free fingerprint hashing algorithm based on minimum distance graphs. Pattern Recogn 45(9):3373\u20133388. \n                    https:\/\/doi.org\/10.1016\/j.patcog.2012.02.022","journal-title":"Pattern Recogn"},{"key":"2266_CR50","volume-title":"The theory of error-correcting codes","author":"F MacWilliams","year":"2006","unstructured":"MacWilliams F, Sloane N (2006) The theory of error-correcting codes. North-Holland, Amsterdam"},{"key":"2266_CR51","doi-asserted-by":"crossref","unstructured":"Chaudhry J, Qidwai UA, Rittenhouse RG, Lee M (2012) Vulnerabilities and verification of cryptographic protocols and their future in wireless body area networks. In: 2012 International Conference on Emerging Technologies (ICET). IEEE, pp 1\u20135","DOI":"10.1109\/ICET.2012.6375433"},{"issue":"3","key":"2266_CR52","first-page":"347","volume":"7","author":"RG Rittenhouse","year":"2013","unstructured":"Rittenhouse RG, Chaudry JA, Lee M (2013) Security in graphical authentication. Int J Secur Appl 7(3):347\u2013356","journal-title":"Int J Secur Appl"},{"key":"2266_CR53","unstructured":"Chaudhry J, Farmand S, Islam SM, Islam MR, Hannay P, Valli C (2017) Discovering trends for the development of novel authentication applications for dementia patients. In: International Conference on Applications and Techniques in Cyber Security and Intelligence. Springer, pp 220\u2013237"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-018-2266-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-018-2266-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-018-2266-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,23]],"date-time":"2019-09-23T15:37:04Z","timestamp":1569253024000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-018-2266-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1,29]]},"references-count":53,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2018,10]]}},"alternative-id":["2266"],"URL":"https:\/\/doi.org\/10.1007\/s11227-018-2266-0","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,1,29]]},"assertion":[{"value":"29 January 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}