{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T21:24:37Z","timestamp":1777497877241,"version":"3.51.4"},"publisher-location":"Cham","reference-count":53,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032006325","type":"print"},{"value":"9783032006332","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-032-00633-2_7","type":"book-chapter","created":{"date-parts":[[2025,8,8]],"date-time":"2025-08-08T10:15:30Z","timestamp":1754648130000},"page":"108-121","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Quantum Security Mechanisms for\u00a0Defense Applications"],"prefix":"10.1007","author":[{"given":"Joan","family":"Bas","sequence":"first","affiliation":[]},{"given":"Marta I.","family":"Garc\u00eda-Cid","sequence":"additional","affiliation":[]},{"given":"Francisco","family":"S\u00e1nchez","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3362-9820","authenticated-orcid":false,"given":"Konrad","family":"Wrona","sequence":"additional","affiliation":[]},{"given":"Joanna","family":"Sliwa","sequence":"additional","affiliation":[]},{"given":"Federico","family":"Grasselli","sequence":"additional","affiliation":[]},{"given":"Kadir","family":"Durak","sequence":"additional","affiliation":[]},{"given":"Michal","family":"Krelina","sequence":"additional","affiliation":[]},{"given":"Armando","family":"Pinto","sequence":"additional","affiliation":[]},{"given":"Nuno","family":"Silva","sequence":"additional","affiliation":[]},{"given":"Marco","family":"Piani","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,9]]},"reference":[{"key":"7_CR1","doi-asserted-by":"publisher","first-page":"2155","DOI":"10.1007\/s11128-013-0641-6","volume":"13","author":"A Abidin","year":"2014","unstructured":"Abidin, A., Larsson, J.\u00c5.: Direct proof of security of wegman-carter authentication with partially known key. Quantum Inf. Process. 13, 2155\u20132170 (2014)","journal-title":"Quantum Inf. Process."},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"et\u00a0al., D.P.: The evolution of quantum secure direct communication: on the road to the qinternet. IEEE Commun. Surv. Tutor. 26(3), 1898\u20131949 (2024). third quarter","DOI":"10.1109\/COMST.2024.3367535"},{"issue":"3","key":"7_CR3","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.93.032325","volume":"93","author":"R Amiri","year":"2016","unstructured":"Amiri, R., Wallden, P., Kent, A., Andersson, E.: Secure quantum signatures using insecure quantum channels. Phys. Rev. A 93(3), 032325 (2016)","journal-title":"Phys. Rev. A"},{"issue":"1","key":"7_CR4","doi-asserted-by":"publisher","first-page":"5480","DOI":"10.1038\/ncomms6480","volume":"5","author":"BA Bell","year":"2014","unstructured":"Bell, B.A., et al.: Experimental demonstration of graph-state quantum secret sharing. Nat. Commun. 5(1), 5480 (2014). https:\/\/doi.org\/10.1038\/ncomms6480","journal-title":"Nat. Commun."},{"issue":"21","key":"7_CR5","doi-asserted-by":"publisher","first-page":"3121","DOI":"10.1103\/PhysRevLett.68.3121","volume":"68","author":"CH Bennett","year":"1992","unstructured":"Bennett, C.H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68(21), 3121 (1992)","journal-title":"Phys. Rev. Lett."},{"key":"7_CR6","doi-asserted-by":"publisher","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. Theoret. Comput. Sci. 560, 7\u201311 (2014). https:\/\/doi.org\/10.1016\/j.tcs.2014.05.025, theoretical Aspects of Quantum Cryptography \u2013 celebrating 30 years of BB84","DOI":"10.1016\/j.tcs.2014.05.025"},{"issue":"5","key":"7_CR7","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1103\/PhysRevLett.68.557","volume":"68","author":"CH Bennett","year":"1992","unstructured":"Bennett, C.H., Brassard, G., Mermin, N.D.: Quantum cryptography without bell\u2019s theorem. Phys. Rev. Lett. 68(5), 557 (1992)","journal-title":"Phys. Rev. Lett."},{"key":"7_CR8","unstructured":"BSI: Implementation attacks against QKD systems (2023). https:\/\/www.bsi.bund.de\/EN\/Service-Navi\/Publikationen\/Studien\/QKD-Systems\/Implementation_Attacks_QKD_Systems_node.html"},{"key":"7_CR9","doi-asserted-by":"publisher","unstructured":"Das, N., Paul, G.: Measurement device\u2013independent quantum secure direct communication with user authentication. Quantum Inf. Process. 21, 260 (2022). https:\/\/doi.org\/10.1007\/s11128-022-03572-z","DOI":"10.1007\/s11128-022-03572-z"},{"issue":"4","key":"7_CR10","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.112.040502","volume":"112","author":"V Dunjko","year":"2014","unstructured":"Dunjko, V., Wallden, P., Andersson, E.: Quantum digital signatures without quantum memory. Phys. Rev. Lett. 112(4), 040502 (2014)","journal-title":"Phys. Rev. Lett."},{"issue":"6","key":"7_CR11","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1103\/PhysRevLett.67.661","volume":"67","author":"AK Ekert","year":"1991","unstructured":"Ekert, A.K.: Quantum cryptography based on bell\u2019s theorem. Phys. Rev. Lett. 67(6), 661 (1991)","journal-title":"Phys. Rev. Lett."},{"key":"7_CR12","unstructured":"ETSI: Etsi gs 014: Quantum key distribution (QKD); protocol and data format of restbased key delivery API (2019)"},{"key":"7_CR13","unstructured":"ETSI: Etsi gs 004: Quantum key distribution (QKD); application interface (2020)"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Fiat, A., Shamir, A.: How to prove yourself: practical solutions to identification and signature problems. In: Conference on the Theory and Application of Cryptographic Techniques, pp. 186\u2013194. Springer (1986)","DOI":"10.1007\/3-540-47721-7_12"},{"key":"7_CR15","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.114.090501","volume":"114","author":"Y Fu","year":"2015","unstructured":"Fu, Y., Yin, H.L., Chen, T.Y., Chen, Z.B.: Long-distance measurement-device-independent multiparty quantum communication. Phys. Rev. Lett. 114, 090501 (2015). https:\/\/doi.org\/10.1103\/PhysRevLett.114.090501","journal-title":"Phys. Rev. Lett."},{"issue":"9","key":"7_CR16","doi-asserted-by":"publisher","first-page":"15955","DOI":"10.1364\/OE.517754","volume":"32","author":"MI Garc\u00eda-Cid","year":"2024","unstructured":"Garc\u00eda-Cid, M.I., Bodanapu, D., Gatto, A., Martelli, P., Mart\u00edn, V., Ortiz, L.: Experimental implementation of a quantum zero-knowledge proof for user authentication. Opt. Express 32(9), 15955\u201315966 (2024)","journal-title":"Opt. Express"},{"issue":"1","key":"7_CR17","doi-asserted-by":"publisher","first-page":"11","DOI":"10.3390\/cryptography9010011","volume":"9","author":"MI Garc\u00eda-Cid","year":"2025","unstructured":"Garc\u00eda-Cid, M.I., Mart\u00edn, R., Domingo, D., Mart\u00edn, V., Ortiz, L.: Design and implementation of a quantum-assisted digital signature. Cryptography 9(1), 11 (2025)","journal-title":"Cryptography"},{"key":"7_CR18","unstructured":"Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof-systems. In: Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali, pp. 203\u2013225 (2019)"},{"key":"7_CR19","unstructured":"Gottesman, D., Chuang, I.: Quantum digital signatures. arXiv preprint quant-ph\/0105032 (2001)"},{"key":"7_CR20","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.100.022339","volume":"100","author":"WP Grice","year":"2019","unstructured":"Grice, W.P., Qi, B.: Quantum secret sharing using weak coherent states. Phys. Rev. A 100, 022339 (2019). https:\/\/doi.org\/10.1103\/PhysRevA.100.022339","journal-title":"Phys. Rev. A"},{"key":"7_CR21","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.88.057902","volume":"88","author":"F Grosshans","year":"2002","unstructured":"Grosshans, F., Grangier, P.: Continuous variable quantum cryptography using coherent states. Phys. Rev. Lett. 88, 057902 (2002). https:\/\/doi.org\/10.1103\/PhysRevLett.88.057902","journal-title":"Phys. Rev. Lett."},{"issue":"20","key":"7_CR22","doi-asserted-by":"publisher","first-page":"32244","DOI":"10.1364\/OE.440365","volume":"29","author":"J Gu","year":"2021","unstructured":"Gu, J., Xie, Y.M., Liu, W.B., Fu, Y., Yin, H.L., Chen, Z.B.: Secure quantum secret sharing without signal disturbance monitoring. Opt. Express 29(20), 32244\u201332255 (2021). https:\/\/doi.org\/10.1364\/OE.440365","journal-title":"Opt. Express"},{"key":"7_CR23","doi-asserted-by":"publisher","first-page":"1829","DOI":"10.1103\/PhysRevA.59.1829","volume":"59","author":"M Hillery","year":"1999","unstructured":"Hillery, M., Bu\u017eek, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. A 59, 1829\u20131834 (1999). https:\/\/doi.org\/10.1103\/PhysRevA.59.1829","journal-title":"Phys. Rev. A"},{"key":"7_CR24","unstructured":"IETF: Secure key integration protocol (2024). https:\/\/www.ietf.org\/archive\/id\/draft-cisco-skip-00.html"},{"key":"7_CR25","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.95.012315","volume":"95","author":"I Kogias","year":"2017","unstructured":"Kogias, I., Xiang, Y., He, Q., Adesso, G.: Unconditional security of entanglement-based continuous-variable quantum secret sharing. Phys. Rev. A 95, 012315 (2017). https:\/\/doi.org\/10.1103\/PhysRevA.95.012315","journal-title":"Phys. Rev. A"},{"issue":"18","key":"7_CR26","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.95.180503","volume":"95","author":"AM Lance","year":"2005","unstructured":"Lance, A.M., Symul, T., Sharma, V., Weedbrook, C., Ralph, T.C., Lam, P.K.: No-switching quantum key distribution using broadband modulated coherent light. Phys. Rev. Lett. 95(18), 180503 (2005)","journal-title":"Phys. Rev. Lett."},{"key":"7_CR27","doi-asserted-by":"crossref","unstructured":"Lanet, J.L., Toma, C.: Innovative Security Solutions for Information Technology and Communications: 11th International Conference, SecITC 2018, Bucharest, Romania, November 8\u20139, 2018, Revised Selected Papers, vol. 11359. Springer (2019)","DOI":"10.1007\/978-3-030-12942-2"},{"key":"7_CR28","doi-asserted-by":"publisher","unstructured":"Liu, S., Lu, Z., Wang, P., Tian, Y., Wang, X., Li, Y.: Experimental demonstration of multiparty quantum secret sharing and conference key agreement. NPJ Quant. Inf. 9(1), 92 (2023). https:\/\/doi.org\/10.1038\/s41534-023-00763-z","DOI":"10.1038\/s41534-023-00763-z"},{"key":"7_CR29","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.94.230504","volume":"94","author":"HK Lo","year":"2005","unstructured":"Lo, H.K., Ma, X., Chen, K.: Decoy state quantum key distribution. Phys. Rev. Lett. 94, 230504 (2005). https:\/\/doi.org\/10.1103\/PhysRevLett.94.230504","journal-title":"Phys. Rev. Lett."},{"issue":"3","key":"7_CR30","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/MNET.108.2100375","volume":"36","author":"GL Long","year":"2022","unstructured":"Long, G.L., Pan, D., Sheng, Y.B., Xue, Q., Lu, J., Hanzo, L.: An evolutionary pathway for the quantum internet relying on secure classical repeaters. IEEE Network 36(3), 82\u201388 (2022)","journal-title":"IEEE Network"},{"issue":"11","key":"7_CR31","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1007\/s11128-018-2059-7","volume":"17","author":"C Lu","year":"2018","unstructured":"Lu, C., Miao, F., Hou, J., Meng, K.: Verifiable threshold quantum secret sharing with sequential communication. Quantum Inf. Process. 17(11), 310 (2018)","journal-title":"Quantum Inf. Process."},{"issue":"7","key":"7_CR32","doi-asserted-by":"publisher","first-page":"10162","DOI":"10.1364\/OE.420667","volume":"29","author":"YS Lu","year":"2021","unstructured":"Lu, Y.S., et al.: Efficient quantum digital signatures without symmetrization step. Opt. Express 29(7), 10162\u201310171 (2021)","journal-title":"Opt. Express"},{"key":"7_CR33","unstructured":"Mosca, M.: Cybersecurity in a quantum world: will we be ready? (2015). https:\/\/csrc.nist.gov\/csrc\/media\/events\/workshop-on-cybersecurity-in-a-post-quantum-world\/documents\/presentations\/session8-mosca-michele.pdf"},{"key":"7_CR34","unstructured":"OASIS: Key management interoperability protocol specification (2019). https:\/\/docs.oasis-open.org\/kmip\/spec\/v1.4\/errata01\/os\/kmip-spec-v1.4-errata01-os-redlined.pdf"},{"issue":"2","key":"7_CR35","doi-asserted-by":"publisher","first-page":"163","DOI":"10.3390\/e23020163","volume":"23","author":"M Pavi\u010di\u0107","year":"2021","unstructured":"Pavi\u010di\u0107, M.: How secure are two-way ping-pong and lm05 QKD protocols under a man-in-the-middle attack? Entropy 23(2), 163 (2021)","journal-title":"Entropy"},{"key":"7_CR36","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.76.062324","volume":"76","author":"SJ Qin","year":"2007","unstructured":"Qin, S.J., Gao, F., Wen, Q.Y., Zhu, F.C.: Cryptanalysis of the hillery-bu\u017eek-berthiaume quantum secret-sharing protocol. Phys. Rev. A 76, 062324 (2007). https:\/\/doi.org\/10.1103\/PhysRevA.76.062324","journal-title":"Phys. Rev. A"},{"key":"7_CR37","unstructured":"Rabin, M.O.: How to exchange secrets with oblivious transfer. Cryptology ePrint Archive (2005)"},{"issue":"7","key":"7_CR38","doi-asserted-by":"publisher","first-page":"945","DOI":"10.3390\/e24070945","volume":"24","author":"MB Santos","year":"2022","unstructured":"Santos, M.B., Mateus, P., Pinto, A.N.: Quantum oblivious transfer: a short review. Entropy 24(7), 945 (2022)","journal-title":"Entropy"},{"key":"7_CR39","unstructured":"Sasson, E.B., et al.: Zerocash: decentralized anonymous payments from bitcoin. In: 2014 IEEE Symposium on Security and Privacy, pp. 459\u2013474. IEEE (2014)"},{"issue":"11","key":"7_CR40","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22(11), 612\u2013613 (1979). https:\/\/doi.org\/10.1145\/359168.359176","journal-title":"Commun. ACM"},{"issue":"2","key":"7_CR41","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1103\/PhysRevLett.85.441","volume":"85","author":"PW Shor","year":"2000","unstructured":"Shor, P.W., Preskill, J.: Simple proof of security of the bb84 quantum key distribution protocol. Phys. Rev. Lett. 85(2), 441 (2000)","journal-title":"Phys. Rev. Lett."},{"key":"7_CR42","unstructured":"of\u00a0Standards, N.I., Technologies: post-quantum cryptography (2016). https:\/\/csrc.nist.gov\/projects\/post-quantumcryptography"},{"key":"7_CR43","unstructured":"of\u00a0Standards, N.I., Technologies: Module-lattice-based digital signature standard (2025). https:\/\/csrc.nist.gov\/pubs\/fips\/204\/final"},{"key":"7_CR44","unstructured":"of\u00a0Standards, N.I., Technologies: Statelesshhash-based digital signature standard (2025). https:\/\/csrc.nist.gov\/pubs\/fips\/205\/final"},{"key":"7_CR45","doi-asserted-by":"publisher","DOI":"10.1080\/09500340701324681","author":"LL S\u00e1nchez-Soto","year":"2007","unstructured":"S\u00e1nchez-Soto, L.L., Aguilar, G.H., Garcia-Escart\u00edn, J.C.: Quantum relays and entanglement swapping in quantum communications. J. Mod. Opt. (2007). https:\/\/doi.org\/10.1080\/09500340701324681","journal-title":"J. Mod. Opt."},{"key":"7_CR46","doi-asserted-by":"crossref","unstructured":"Tarable, A., Paganelli, R.P., Storelli, E., Gatto, A., Ferrari, M.: Generalized quantum-assisted digital signature. arXiv preprint arXiv:2406.19978 (2024)","DOI":"10.1109\/TQE.2025.3595703"},{"key":"7_CR47","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.92.030302","volume":"92","author":"A Tavakoli","year":"2015","unstructured":"Tavakoli, A., Herbauts, I., \u017bukowski, M., Bourennane, M.: Secret sharing with a single $$d$$-level quantum system. Phys. Rev. A 92, 030302 (2015). https:\/\/doi.org\/10.1103\/PhysRevA.92.030302","journal-title":"Phys. Rev. A"},{"key":"7_CR48","doi-asserted-by":"publisher","DOI":"10.1080\/09500340701340527","author":"SE Venegas-Andraca","year":"2007","unstructured":"Venegas-Andraca, S.E., Retamal, J.C., Eberly, R.B.: Four-party quantum communication with entanglement swapping. J. Mod. Opt. (2007). https:\/\/doi.org\/10.1080\/09500340701340527","journal-title":"J. Mod. Opt."},{"key":"7_CR49","doi-asserted-by":"publisher","DOI":"10.1103\/PRXQuantum.2.040339","volume":"2","author":"N Walk","year":"2021","unstructured":"Walk, N., Eisert, J.: Sharing classical secrets with continuous-variable entanglement: composable security and network coding advantage. PRX Quantum 2, 040339 (2021). https:\/\/doi.org\/10.1103\/PRXQuantum.2.040339","journal-title":"PRX Quantum"},{"issue":"1","key":"7_CR50","first-page":"11","volume":"9","author":"S Wang","year":"2025","unstructured":"Wang, S.: A quantum good authentication protocol (QGP) integrating quantum photonic channels and dilithium signatures. J. CS IAC 9(1), 11\u201321 (2025)","journal-title":"J. CS IAC"},{"key":"7_CR51","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.99.062311","volume":"99","author":"BP Williams","year":"2019","unstructured":"Williams, B.P., Lukens, J.M., Peters, N.A., Qi, B., Grice, W.P.: Quantum secret sharing with polarization-entangled photon pairs. Phys. Rev. A 99, 062311 (2019). https:\/\/doi.org\/10.1103\/PhysRevA.99.062311","journal-title":"Phys. Rev. A"},{"issue":"10s","key":"7_CR52","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3503045","volume":"54","author":"VK Yadav","year":"2022","unstructured":"Yadav, V.K., Andola, N., Verma, S., Venkatesan, S.: A survey of oblivious transfer protocol. ACM Comput. Surv. (CSUR) 54(10s), 1\u201337 (2022)","journal-title":"ACM Comput. Surv. (CSUR)"},{"issue":"1","key":"7_CR53","doi-asserted-by":"publisher","first-page":"3045","DOI":"10.1038\/s41598-019-39454-1","volume":"9","author":"HL Yin","year":"2019","unstructured":"Yin, H.L., Fu, Y.: Measurement-device-independent twin-field quantum key distribution. Sci. Rep. 9(1), 3045 (2019)","journal-title":"Sci. Rep."}],"container-title":["Lecture Notes in Computer Science","Availability, Reliability and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-00633-2_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T19:24:47Z","timestamp":1757359487000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-00633-2_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783032006325","9783032006332"],"references-count":53,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-00633-2_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"9 August 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ARES","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Availability, Reliability and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ghent","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Belgium","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 August 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 August 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ares-12025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2025.ares-conference.eu","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}