{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T16:16:56Z","timestamp":1770221816537,"version":"3.49.0"},"publisher-location":"Cham","reference-count":42,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319723587","type":"print"},{"value":"9783319723594","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-72359-4_7","type":"book-chapter","created":{"date-parts":[[2017,12,7]],"date-time":"2017-12-07T11:19:11Z","timestamp":1512645551000},"page":"118-135","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Hierarchical Conditional Proxy Re-Encryption: A New Insight of Fine-Grained Secure Data Sharing"],"prefix":"10.1007","author":[{"given":"Kai","family":"He","sequence":"first","affiliation":[]},{"given":"Xueqiao","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Huaqiang","family":"Yuan","sequence":"additional","affiliation":[]},{"given":"Wenhong","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Kaitai","family":"Liang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,8]]},"reference":[{"issue":"1","key":"7_CR1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1127345.1127346","volume":"9","author":"G Ateniese","year":"2006","unstructured":"Ateniese, G., Kevin, F., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9(1), 1\u201330 (2006)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"7_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/BFb0054122","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u201998","author":"M Blaze","year":"1998","unstructured":"Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127\u2013144. Springer, Heidelberg (1998). https:\/\/doi.org\/10.1007\/BFb0054122"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Canetti, R., Hohenberger, S.: Chosen-ciphertext secure proxy re-encryption. In: Proceedings of the 2007 ACM Conference on Computer and Communications Security (CCS 2007), Alexandria, Virginia, USA, 28\u201331 October 2007, pp. 185\u2013194 (2007)","DOI":"10.1145\/1315245.1315269"},{"issue":"10","key":"7_CR4","doi-asserted-by":"crossref","first-page":"2349","DOI":"10.1109\/TIFS.2016.2581147","volume":"11","author":"A Castiglione","year":"2016","unstructured":"Castiglione, A., De Santis, A., Masucci, B., Palmieri, F., Castiglione, A., Huang, X.: Cryptographic hierarchical access control for dynamic structures. IEEE Trans. Inf. Forensics Secur. 11(10), 2349\u20132364 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"4","key":"7_CR5","doi-asserted-by":"crossref","first-page":"850","DOI":"10.1109\/TIFS.2015.2512533","volume":"11","author":"A Castiglione","year":"2016","unstructured":"Castiglione, A., De Santis, A., Masucci, B., Palmieri, F., Castiglione, A., Li, J., Huang, X.: Hierarchical and shared access control. IEEE Trans. Inf. Forensics Secur. 11(4), 850\u2013865 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"7_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1007\/978-3-540-75496-1_13","volume-title":"Information Security","author":"C-K Chu","year":"2007","unstructured":"Chu, C.-K., Tzeng, W.-G.: Identity-based proxy re-encryption without random oracles. In: Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds.) ISC 2007. LNCS, vol. 4779, pp. 189\u2013202. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-75496-1_13"},{"key":"7_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-89641-8_1","volume-title":"Cryptology and Network Security","author":"RH Deng","year":"2008","unstructured":"Deng, R.H., Weng, J., Liu, S., Chen, K.: Chosen-ciphertext secure proxy re-encryption without pairings. In: Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.) CANS 2008. LNCS, vol. 5339, pp. 1\u201317. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-89641-8_1"},{"issue":"12","key":"7_CR8","doi-asserted-by":"crossref","first-page":"2293","DOI":"10.1016\/j.jss.2011.06.045","volume":"84","author":"L Fang","year":"2011","unstructured":"Fang, L., Susilo, W., Ge, C., Wang, J.: Interactive conditional proxy re-encryption with fine grain policy. J. Syst. Softw. 84(12), 2293\u20132302 (2011)","journal-title":"J. Syst. Softw."},{"key":"7_CR9","unstructured":"Giuseppe, A., Kevin., Matthew, G., Susan, H.: Improved proxy re-encryption schemes with applications to secure distributed storage. In: Proceedings of the Network and Distributed System Security Symposium (NDSS 2005), San Diego, California, USA (2005)"},{"key":"7_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1007\/978-3-540-72738-5_19","volume-title":"Applied Cryptography and Network Security","author":"M Green","year":"2007","unstructured":"Green, M., Ateniese, G.: Identity-based proxy re-encryption. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 288\u2013306. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-72738-5_19"},{"key":"7_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1007\/978-3-642-27954-6_22","volume-title":"Topics in Cryptology \u2013 CT-RSA 2012","author":"G Hanaoka","year":"2012","unstructured":"Hanaoka, G., Kawai, Y., Kunihiro, N., Matsuda, T., Weng, J., Zhang, R., Zhao, Y.: Generic construction of chosen ciphertext secure proxy re-encryption. In: Dunkelman, O. (ed.) CT-RSA 2012. LNCS, vol. 7178, pp. 349\u2013364. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-27954-6_22"},{"key":"7_CR12","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1016\/j.tcs.2016.08.023","volume":"652","author":"K He","year":"2016","unstructured":"He, K., Weng, J., Deng, R.H., Liu, J.K.: On the security of two identity-based conditional proxy re-encryption schemes. Theor. Comput. Sci. 652, 18\u201327 (2016)","journal-title":"Theor. Comput. Sci."},{"key":"7_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/978-3-319-46298-1_5","volume-title":"Network and System Security","author":"K He","year":"2016","unstructured":"He, K., Weng, J., Liu, J.K., Zhou, W., Liu, J.-N.: Efficient fine-grained access control for secure personal health records in cloud computing. In: Chen, J., Piuri, V., Su, C., Yung, M. (eds.) NSS 2016. LNCS, vol. 9955, pp. 65\u201379. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46298-1_5"},{"issue":"3","key":"7_CR14","first-page":"289","volume":"45","author":"C-C Lee","year":"2016","unstructured":"Lee, C.-C., Li, C.-T., Chen, C.-L., Chiu, S.-T.: A searchable hierarchical conditional proxy re-encryption scheme for cloud storage services. ITC 45(3), 289\u2013299 (2016)","journal-title":"ITC"},{"key":"7_CR15","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1016\/j.future.2014.11.016","volume":"52","author":"K Liang","year":"2015","unstructured":"Liang, K., Au, M.H., Liu, J.K., Susilo, W., Wong, D.S., Yang, G., Yu, Y., Yang, A.: A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing. Future Gener. Comput. Syst. 52, 95\u2013108 (2015)","journal-title":"Future Gener. Comput. Syst."},{"key":"7_CR16","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1016\/j.tcs.2014.04.027","volume":"539","author":"K Liang","year":"2014","unstructured":"Liang, K., Chu, C.-K., Tan, X., Wong, D.S., Tang, C., Zhou, J.: Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts. Theor. Comput. Sci. 539, 87\u2013105 (2014)","journal-title":"Theor. Comput. Sci."},{"issue":"8","key":"7_CR17","doi-asserted-by":"crossref","first-page":"2004","DOI":"10.1002\/cpe.3397","volume":"27","author":"K Liang","year":"2015","unstructured":"Liang, K., Fang, L., Wong, D.S., Susilo, W.: A ciphertext-policy attribute-based proxy re-encryption scheme for data sharing in public clouds. Concurr. Comput. Pract. Exp. 27(8), 2004\u20132027 (2015)","journal-title":"Concurr. Comput. Pract. Exp."},{"key":"7_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/978-3-319-11203-9_15","volume-title":"Computer Security - ESORICS 2014","author":"K Liang","year":"2014","unstructured":"Liang, K., Liu, J.K., Wong, D.S., Susilo, W.: An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing. In: Kuty\u0142owski, M., Vaidya, J. (eds.) ESORICS 2014. LNCS, vol. 8712, pp. 257\u2013272. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-11203-9_15"},{"key":"7_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/978-3-642-37682-5_17","volume-title":"Information Security and Cryptology \u2013 ICISC 2012","author":"K Liang","year":"2013","unstructured":"Liang, K., Liu, Z., Tan, X., Wong, D.S., Tang, C.: A CCA-secure identity-based conditional proxy re-encryption without random oracles. In: Kwon, T., Lee, M.-K., Kwon, D. (eds.) ICISC 2012. LNCS, vol. 7839, pp. 231\u2013246. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-37682-5_17"},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Liang, K., Su, C., Chen, J., Liu, J.K.: Efficient multi-function data sharing and searching mechanism for cloud-based encrypted data. In: Chen, X., Wang, X., Huang, X. (eds.) Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security (AsiaCCS 2016), Xi\u2019an, China, May 30 - June 3, 2016, pp. 83\u201394. ACM (2016)","DOI":"10.1145\/2897845.2897865"},{"issue":"9","key":"7_CR21","doi-asserted-by":"crossref","first-page":"1981","DOI":"10.1109\/TIFS.2015.2442215","volume":"10","author":"K Liang","year":"2015","unstructured":"Liang, K., Susilo, W.: Searchable attribute-based mechanism with efficient data sharing for secure cloud storage. IEEE Trans. Inf. Forensics Secur. 10(9), 1981\u20131992 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"8","key":"7_CR22","doi-asserted-by":"crossref","first-page":"1578","DOI":"10.1109\/TIFS.2015.2419186","volume":"10","author":"K Liang","year":"2015","unstructured":"Liang, K., Susilo, W., Liu, J.K.: Privacy-preserving ciphertext multi-sharing control for big data storage. IEEE Trans. Inf. Forensics Secur. 10(8), 1578\u20131589 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"7_CR23","doi-asserted-by":"crossref","unstructured":"Liang, X., Cao, Z., Lin, H., Shao, J.: Attribute based proxy re-encryption with delegating capabilities. In: Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security (ASIACCS 2009), Sydney, Australia, 10\u201312 March 2009, pp. 276\u2013286 (2009)","DOI":"10.1145\/1533057.1533094"},{"key":"7_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1007\/978-3-540-78440-1_21","volume-title":"Public Key Cryptography \u2013 PKC 2008","author":"B Libert","year":"2008","unstructured":"Libert, B., Vergnaud, D.: Unidirectional chosen-ciphertext secure proxy re-encryption. In: Cramer, R. (ed.) PKC 2008. LNCS, vol. 4939, pp. 360\u2013379. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-78440-1_21"},{"issue":"3","key":"7_CR25","doi-asserted-by":"crossref","first-page":"1786","DOI":"10.1109\/TIT.2011.2104470","volume":"57","author":"B Libert","year":"2011","unstructured":"Libert, B., Vergnaud, D.: Unidirectional chosen-ciphertext secure proxy re-encryption. IEEE Trans. Inf. Theory 57(3), 1786\u20131802 (2011)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"7_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/978-3-642-17455-1_21","volume-title":"Pairing-Based Cryptography - Pairing 2010","author":"L Wang","year":"2010","unstructured":"Wang, L., Wang, L., Mambo, M., Okamoto, E.: New identity-based proxy re-encryption schemes to prevent collusion attacks. In: Joye, M., Miyaji, A., Otsuka, A. (eds.) Pairing 2010. LNCS, vol. 6487, pp. 327\u2013346. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-17455-1_21"},{"issue":"12","key":"7_CR27","doi-asserted-by":"crossref","first-page":"1748","DOI":"10.1002\/sec.1446","volume":"9","author":"S Lin","year":"2016","unstructured":"Lin, S., Zhang, R., Wang, M.: Verifiable attribute-based proxy re-encryption for secure public cloud data sharing. Secur. Commun. Netw. 9(12), 1748\u20131758 (2016)","journal-title":"Secur. Commun. Netw."},{"key":"7_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/978-3-642-31912-9_8","volume-title":"Information Security and Cryptology - ICISC 2011","author":"S Luo","year":"2012","unstructured":"Luo, S., Shen, Q., Chen, Z.: Fully secure unidirectional identity-based proxy re-encryption. In: Kim, H. (ed.) ICISC 2011. LNCS, vol. 7259, pp. 109\u2013126. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-31912-9_8"},{"key":"7_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/978-3-642-13013-7_16","volume-title":"Public Key Cryptography \u2013 PKC 2010","author":"T Matsuda","year":"2010","unstructured":"Matsuda, T., Nishimaki, R., Tanaka, K.: CCA proxy re-encryption without bilinear maps in the standard model. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol. 6056, pp. 261\u2013278. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-13013-7_16"},{"key":"7_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/978-3-540-73489-5_13","volume-title":"Pairing-Based Cryptography \u2013 Pairing 2007","author":"T Matsuo","year":"2007","unstructured":"Matsuo, T.: Proxy re-encryption systems for identity-based encryption. In: Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (eds.) Pairing 2007. LNCS, vol. 4575, pp. 247\u2013267. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-73489-5_13"},{"issue":"1","key":"7_CR31","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1587\/transfun.E94.A.36","volume":"94\u2013A","author":"T Mizuno","year":"2011","unstructured":"Mizuno, T., Doi, H.: Secure and efficient IBE-PKE proxy re-encryption. IEICE Trans. 94\u2013A(1), 36\u201344 (2011)","journal-title":"IEICE Trans."},{"issue":"9","key":"7_CR32","doi-asserted-by":"crossref","first-page":"2268","DOI":"10.1109\/TKDE.2013.68","volume":"26","author":"M Nabeel","year":"2014","unstructured":"Nabeel, M., Bertino, E.: Privacy preserving delegated access control in public clouds. IEEE Trans. Knowl. Data Eng. 26(9), 2268\u20132280 (2014)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"7_CR33","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1016\/j.ins.2012.04.013","volume":"206","author":"J Shao","year":"2012","unstructured":"Shao, J., Cao, Z.: Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption. Inf. Sci. 206, 83\u201395 (2012)","journal-title":"Inf. Sci."},{"key":"7_CR34","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1016\/j.pmcj.2015.06.016","volume":"28","author":"J Shao","year":"2016","unstructured":"Shao, J., Rongxing, L., Lin, X., Liang, K.: Secure bidirectional proxy re-encryption for cryptographic cloud storage. Pervasive Mobile Comput. 28, 113\u2013121 (2016)","journal-title":"Pervasive Mobile Comput."},{"key":"7_CR35","unstructured":"Smith, T.: DVD jon: Buy DRM-less tracks from Apple iTunes, January 2005. http:\/\/www.theregister.co.uk\/2005\/03\/18\/itunespymusique"},{"key":"7_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1007\/978-3-540-89754-5_11","volume-title":"Progress in Cryptology - INDOCRYPT 2008","author":"Q Tang","year":"2008","unstructured":"Tang, Q.: Type-based proxy re-encryption and its construction. In: Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008. LNCS, vol. 5365, pp. 130\u2013144. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-89754-5_11"},{"key":"7_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/978-3-642-36095-4_18","volume-title":"Topics in Cryptology \u2013 CT-RSA 2013","author":"T Isshiki","year":"2013","unstructured":"Isshiki, T., Nguyen, M.H., Tanaka, K.: Proxy re-encryption in a stronger security model extended from CT-RSA2012. In: Dawson, E. (ed.) CT-RSA 2013. LNCS, vol. 7779, pp. 277\u2013292. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-36095-4_18"},{"issue":"1","key":"7_CR38","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1587\/transfun.E95.A.70","volume":"95\u2013A","author":"L Wang","year":"2012","unstructured":"Wang, L., Wang, L., Mambo, M., Okamoto, E.: Identity-based proxy cryptosystems with revocability and hierarchical confidentialities. IEICE Trans. 95\u2013A(1), 70\u201388 (2012)","journal-title":"IEICE Trans."},{"key":"7_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1007\/11426639_7","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"B Waters","year":"2005","unstructured":"Waters, B.: Efficient identity-based encryption without random oracles. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 114\u2013127. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11426639_7"},{"issue":"3","key":"7_CR40","doi-asserted-by":"crossref","first-page":"593","DOI":"10.1007\/s11432-010-0047-3","volume":"53","author":"J Weng","year":"2010","unstructured":"Weng, J., Chen, M.-R., Yang, Y., Deng, R.H., Chen, K., Bao, F.: CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles. Sci. China Inf. Sci. 53(3), 593\u2013606 (2010)","journal-title":"Sci. China Inf. Sci."},{"key":"7_CR41","doi-asserted-by":"crossref","unstructured":"Weng, J., Deng, R.H., Ding, X., Chu, C.-K., Lai, J.: Conditional proxy re-encryption secure against chosen-ciphertext attack. In: Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security (ASIACCS 2009), Sydney, Australia, 10\u201312 March 2009, pp. 322\u2013332 (2009)","DOI":"10.1145\/1533057.1533100"},{"key":"7_CR42","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/978-3-642-04474-8_13","volume-title":"Information Security","author":"J Weng","year":"2009","unstructured":"Weng, J., Yang, Y., Tang, Q., Deng, R.H., Bao, F.: Efficient conditional proxy re-encryption with chosen-ciphertext security. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. LNCS, vol. 5735, pp. 151\u2013166. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-04474-8_13"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-72359-4_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,29]],"date-time":"2023-08-29T15:15:27Z","timestamp":1693322127000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-72359-4_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319723587","9783319723594"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-72359-4_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}