{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T11:24:11Z","timestamp":1773833051268,"version":"3.50.1"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T00:00:00Z","timestamp":1729555200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T00:00:00Z","timestamp":1729555200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61962011"],"award-info":[{"award-number":["61962011"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Guiyang City Science and Technology Plan Project","award":["[2021]43-8"],"award-info":[{"award-number":["[2021]43-8"]}]},{"name":"Guizhou Province Hundred-level Innovative Talent Project","award":["GCC[2022]018-1"],"award-info":[{"award-number":["GCC[2022]018-1"]}]},{"name":"Natural Science Research Project of Guizhou Provincial Department of Education","award":["[2023]010"],"award-info":[{"award-number":["[2023]010"]}]},{"name":"Guizhou Provincial Science and Technology Plan Project","award":["ZK[2024]Key058"],"award-info":[{"award-number":["ZK[2024]Key058"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,2]]},"DOI":"10.1007\/s10586-024-04800-0","type":"journal-article","created":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:03:59Z","timestamp":1729616639000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Blockchain-based remote data integrity auditing scheme with deduplication mechanism"],"prefix":"10.1007","volume":"28","author":[{"given":"Shuai","family":"Feng","sequence":"first","affiliation":[]},{"given":"Lunzhi","family":"Deng","sequence":"additional","affiliation":[]},{"given":"Yan","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Yaying","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Wen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,22]]},"reference":[{"key":"4800_CR1","first-page":"1","volume":"16","author":"DRJGJ Rydning","year":"2018","unstructured":"Rydning, D.R.J.G.J., Reinsel, J., Gantz, J.: The digitization of the world from edge to core. Framingham: Int. Data Corp. 16, 1\u201328 (2018)","journal-title":"Framingham: Int. Data Corp."},{"key":"4800_CR2","unstructured":"Tait, R.(2016) Personal details of 50 million Turkish citizens leaked online, hackers claim. The Telegraph."},{"key":"4800_CR3","doi-asserted-by":"crossref","unstructured":"Kaaniche, N., Laurent, M., Belguith, S.: Privacy enhancing technologies for solving the privacy-personalization paradox: Taxonomy and survey. J. Netw. Comput. Appl. 171, 102807 (2020)","DOI":"10.1016\/j.jnca.2020.102807"},{"key":"4800_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2018.08.003","volume":"122","author":"L Zhou","year":"2018","unstructured":"Zhou, L., Fu, A., Yu, S., Su, M., Kuang, B.: Data integrity verification of the outsourced big data in the cloud environment: a survey. J. Netw. Comput. Appl. 122, 1\u201315 (2018). https:\/\/doi.org\/10.1016\/j.jnca.2018.08.003","journal-title":"J. Netw. Comput. Appl."},{"key":"4800_CR5","doi-asserted-by":"crossref","unstructured":"Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.(2009) Enabling public verifiability and data dynamics for storage security in cloud computing. In Computer Security? ESORICS 2009: 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21\u201323: Proceedings. Springer, Berlin Heidelberg.\u00a0pp. 355\u2013370","DOI":"10.1007\/978-3-642-04444-1_22"},{"key":"4800_CR6","doi-asserted-by":"publisher","first-page":"206396","DOI":"10.1109\/ACCESS.2020.3037696","volume":"8","author":"L Deng","year":"2020","unstructured":"Deng, L., Yang, B., Wang, X.: A lightweight identity-based remote data auditing scheme for cloud storage. IEEE Access. 8, 206396\u2013206405 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3037696","journal-title":"IEEE Access."},{"issue":"5","key":"4800_CR7","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1109\/MC.2021.3058022","volume":"54","author":"N Kshetri","year":"2021","unstructured":"Kshetri, N., Voas, J.: Major computing technologies of the past 75 years. Computer 54(5), 15\u201321 (2021). https:\/\/doi.org\/10.1109\/MC.2021.3058022","journal-title":"Computer"},{"issue":"1","key":"4800_CR8","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1109\/TBDATA.2017.2721444","volume":"8","author":"X Yang","year":"2017","unstructured":"Yang, X., Lu, R., Choo, K.K.R., Yin, F., Tang, X.: Achieving efficient and privacy-preserving cross-domain big data deduplication in cloud. IEEE Trans. Big Data. 8(1), 73\u201384 (2017). https:\/\/doi.org\/10.1109\/TBDATA.2017.2721444","journal-title":"IEEE Trans. Big Data."},{"key":"4800_CR9","unstructured":"Bolosky, W. J., Corbin, S., Goebel, D., Douceur, J. R.\u00a0(2000) Single instance storage in Windows 2000. In Proceedings of the 4th USENIX Windows Systems Symposium. 13-24\u00a0"},{"issue":"3","key":"4800_CR10","doi-asserted-by":"publisher","first-page":"1421","DOI":"10.1109\/TETC.2020.3005610","volume":"9","author":"Y Xu","year":"2020","unstructured":"Xu, Y., Zhang, C., Wang, G., Qin, Z., Zeng, Q.: A blockchain-enabled deduplicatable data auditing mechanism for network storage services. IEEE Trans. Emerg. Top. Comput. 9(3), 1421\u20131432 (2020). https:\/\/doi.org\/10.1109\/TETC.2020.3005610","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"issue":"3","key":"4800_CR11","doi-asserted-by":"publisher","first-page":"923","DOI":"10.1109\/TCC.2019.2908400","volume":"9","author":"Y Zhang","year":"2019","unstructured":"Zhang, Y., Xu, C., Lin, X., Shen, X.: Blockchain-based public integrity verification for cloud storage against procrastinating auditors. IEEE Trans. Cloud Comput. 9(3), 923\u2013937 (2019). https:\/\/doi.org\/10.1109\/TCC.2019.2908400","journal-title":"IEEE Trans. Cloud Comput."},{"issue":"6","key":"4800_CR12","doi-asserted-by":"publisher","first-page":"4928","DOI":"10.1109\/TDSC.2023.3237221","volume":"20","author":"M Song","year":"2023","unstructured":"Song, M., Hua, Z., Zheng, Y., Huang, H., Jia, X.: Blockchain-based deduplication and integrity auditing over encrypted cloud storage. IEEE Trans. Dependable Secur. Comput. 20(6), 4928\u20134945 (2023). https:\/\/doi.org\/10.1109\/TDSC.2023.3237221","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"4800_CR13","doi-asserted-by":"crossref","unstructured":"Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.(2007) Provable data possession at untrusted stores. In Proceedings of the 14th ACM conference on Computer and communications security. 598-609\u00a0","DOI":"10.1145\/1315245.1315318"},{"key":"4800_CR14","doi-asserted-by":"crossref","unstructured":"Juels, A., Kaliski Jr, B. S.(2007) PORs: Proofs of retrievability for large files. In Proceedings of the 14th ACM conference on Computer and communications security. 584-597\u00a0","DOI":"10.1145\/1315245.1315317"},{"key":"4800_CR15","doi-asserted-by":"publisher","first-page":"79428","DOI":"10.1109\/ACCESS.2020.2991033","volume":"8","author":"J Liu","year":"2020","unstructured":"Liu, J., Wang, X., Liu, Z., Wang, H., Yang, X.: Privacy-preserving public cloud audit scheme supporting dynamic data for unmanned aerial vehicles. IEEE Access. 8, 79428\u201379439 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2991033","journal-title":"IEEE Access."},{"key":"4800_CR16","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1016\/j.jss.2015.11.044","volume":"113","author":"G Yang","year":"2016","unstructured":"Yang, G., Yu, J., Shen, W., Su, Q., Fu, Z., Hao, R.: Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability. J. Syst. Softw. 113, 130\u2013139 (2016). https:\/\/doi.org\/10.1016\/j.jss.2015.11.044","journal-title":"J. Syst. Softw."},{"issue":"2","key":"4800_CR17","doi-asserted-by":"publisher","first-page":"2703","DOI":"10.1007\/s12652-020-02432-x","volume":"12","author":"H Wang","year":"2021","unstructured":"Wang, H., Wang, X., Xiao, S., Liu, J.: Decentralized data outsourcing auditing protocol based on blockchain. J. Ambient Intell. Humaniz. Comput. 12(2), 2703\u20132714 (2021). https:\/\/doi.org\/10.1007\/s12652-020-02432-x","journal-title":"J. Ambient Intell. Humaniz. Comput."},{"issue":"3","key":"4800_CR18","doi-asserted-by":"publisher","first-page":"2922","DOI":"10.1109\/TCC.2023.3242140","volume":"11","author":"R Ding","year":"2023","unstructured":"Ding, R., Xu, Y., Zhong, H., Cui, J., Min, G.: An efficient integrity checking scheme with full identity anonymity for cloud data sharing. IEEE Trans. Cloud Comput. 11(3), 2922\u20132935 (2023). https:\/\/doi.org\/10.1109\/TCC.2023.3242140","journal-title":"IEEE Trans. Cloud Comput."},{"key":"4800_CR19","doi-asserted-by":"crossref","unstructured":"Yang, C., Zhao, F., Tao, X., Wang, Y.: Publicly verifiable outsourced data migration scheme supporting efficient integrity checking. J. Netw. Comput. Appl. 192, 103184 (2021)","DOI":"10.1016\/j.jnca.2021.103184"},{"key":"4800_CR20","doi-asserted-by":"publisher","first-page":"103629","DOI":"10.1016\/j.csi.2022.103629","volume":"82","author":"C Yang","year":"2022","unstructured":"Yang, C., Liu, Y., Zhao, F., Zhang, S.: Provable data deletion from efficient data integrity auditing and insertion in cloud storage. Comput. Stand. Interfaces. 82, 103629 (2022). https:\/\/doi.org\/10.1016\/j.csi.2022.103629","journal-title":"Comput. Stand. Interfaces."},{"issue":"4","key":"4800_CR21","doi-asserted-by":"publisher","first-page":"155014771984249","DOI":"10.1177\/1550147719842493","volume":"15","author":"Y Liu","year":"2019","unstructured":"Liu, Y., xiao, S., Wang, H., Wang, X.: New provable data transfer from provable data possession and deletion for secure cloud storage. Int. J. Distrib. Sens. Netw. 15(4), 1550147719842493 (2019). https:\/\/doi.org\/10.1177\/1550147719842493","journal-title":"Int. J. Distrib. Sens. Netw."},{"issue":"2","key":"4800_CR22","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1109\/TC.2011.245","volume":"62","author":"C Wang","year":"2011","unstructured":"Wang, C., Chow, S.S., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362\u2013375 (2011). https:\/\/doi.org\/10.1109\/TC.2011.245","journal-title":"IEEE Trans. Comput."},{"key":"4800_CR23","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1007\/s10207-014-0263-8","volume":"14","author":"Y Yu","year":"2015","unstructured":"Yu, Y., Au, M.H., Mu, Y., Tang, S., Ren, J., Susilo, W., Dong, L.: Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage. Int. J. Inf. Secur. 14, 307\u2013318 (2015). https:\/\/doi.org\/10.1007\/s10207-014-0263-8","journal-title":"Int. J. Inf. Secur."},{"issue":"6","key":"4800_CR24","doi-asserted-by":"publisher","first-page":"1929","DOI":"10.1109\/TSC.2019.2892095","volume":"14","author":"H Wang","year":"2019","unstructured":"Wang, H., He, D., Fu, A., Li, Q., Wang, Q.: Provable data possession with outsourced data transfer. IEEE Trans. Serv. Comput. 14(6), 1929\u20131939 (2019). https:\/\/doi.org\/10.1109\/TSC.2019.2892095","journal-title":"IEEE Trans. Serv. Comput."},{"key":"4800_CR25","doi-asserted-by":"publisher","first-page":"902","DOI":"10.1016\/j.future.2019.09.028","volume":"102","author":"P Wei","year":"2020","unstructured":"Wei, P., Wang, D., Zhao, Y., Tyagi, S.K.S., Kumar, N.: Blockchain data-based cloud data integrity protection mechanism. Futur. Gener. Comp. Syst. 102, 902\u2013911 (2020). https:\/\/doi.org\/10.1016\/j.future.2019.09.028","journal-title":"Futur. Gener. Comp. Syst."},{"issue":"2","key":"4800_CR26","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1049\/iet-ifs.2012.0271","volume":"8","author":"H Wang","year":"2014","unstructured":"Wang, H., Wu, Q., Qin, B., Domingo-Ferrer, J.: Identity-based remote data possession checking in public clouds. IET Inf. Secur. 8(2), 114\u2013121 (2014). https:\/\/doi.org\/10.1049\/iet-ifs.2012.0271","journal-title":"IET Inf. Secur."},{"issue":"3","key":"4800_CR27","doi-asserted-by":"publisher","first-page":"608","DOI":"10.1109\/TDSC.2018.2829880","volume":"17","author":"Y Zhang","year":"2018","unstructured":"Zhang, Y., Yu, J., Hao, R., Wang, C., Ren, K.: Enabling efficient user revocation in identity-based cloud storage auditing for shared big data. IEEE Trans. Dependable Secur. Comput. 17(3), 608\u2013619 (2018). https:\/\/doi.org\/10.1109\/TDSC.2018.2829880","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"issue":"4","key":"4800_CR28","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1109\/TIFS.2016.2615853","volume":"12","author":"Y Yu","year":"2016","unstructured":"Yu, Y., Au, M.H., Ateniese, G., Huang, X., Susilo, W., Dai, Y., Min, G.: Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Trans. Inf. Forensic Secur. 12(4), 767\u2013778 (2016). https:\/\/doi.org\/10.1109\/TIFS.2016.2615853","journal-title":"IEEE Trans. Inf. Forensic Secur."},{"issue":"3","key":"4800_CR29","doi-asserted-by":"publisher","first-page":"1232","DOI":"10.1109\/TII.2017.2761806","volume":"14","author":"D He","year":"2017","unstructured":"He, D., Kumar, N., Zeadally, S., Wang, H.: Certificateless provable data possession scheme for cloud-based smart grid data management systems. IEEE Trans. Ind. Inform. 14(3), 1232\u20131241 (2017). https:\/\/doi.org\/10.1109\/TII.2017.2761806","journal-title":"IEEE Trans. Ind. Inform."},{"issue":"6","key":"4800_CR30","doi-asserted-by":"publisher","first-page":"102287","DOI":"10.1016\/j.ipm.2020.102287","volume":"57","author":"J Zhang","year":"2020","unstructured":"Zhang, J., Li, Z., Wang, B., Wang, X.A., Ogiela, U.: Enhanced certificateless auditing protocols for cloud data management and transformative computation. Inf. Process. Manag. 57(6), 102287 (2020). https:\/\/doi.org\/10.1016\/j.ipm.2020.102287","journal-title":"Inf. Process. Manag."},{"issue":"3","key":"4800_CR31","doi-asserted-by":"publisher","first-page":"4245","DOI":"10.1109\/JSYST.2023.3284230","volume":"17","author":"L Deng","year":"2023","unstructured":"Deng, L., Chen, Z., Ruan, Y., Zhou, H., Li, S.: Certificateless provable data possession scheme suitable for smart grid management systems. IEEE Syst. J. 17(3), 4245\u20134256 (2023). https:\/\/doi.org\/10.1109\/JSYST.2023.3284230","journal-title":"IEEE Syst. J."},{"issue":"6","key":"4800_CR32","doi-asserted-by":"publisher","first-page":"3986","DOI":"10.1109\/TSC.2023.3303185","volume":"16","author":"L Deng","year":"2023","unstructured":"Deng, L., Wang, B., Wang, T., Feng, S., Li, S.: Certificateless provable data possession scheme with provable security in the standard model suitable for cloud storage. IEEE Trans. Serv. Comput. 16(6), 3986\u20133998 (2023). https:\/\/doi.org\/10.1109\/TSC.2023.3303185","journal-title":"IEEE Trans. Serv. Comput."},{"key":"4800_CR33","doi-asserted-by":"publisher","first-page":"125478","DOI":"10.1016\/j.amc.2020.125478","volume":"386","author":"Y Ji","year":"2020","unstructured":"Ji, Y., Shao, B., Chang, J., Bian, G.: Privacy-preserving certificateless provable data possession scheme for big data storage on cloud, revisited. Appl. Math. Comput. 386, 125478 (2020). https:\/\/doi.org\/10.1016\/j.amc.2020.125478","journal-title":"Appl. Math. Comput."},{"key":"4800_CR34","doi-asserted-by":"crossref","unstructured":"Zheng, Q., Xu, S.(2012) Secure and efficient proof of storage with deduplication. In Proceedings of the second ACM conference on Data and Application Security and Privacy. pp: 1-12 . https:\/\/doi.org\/10.1145\/2133601.2133603","DOI":"10.1145\/2133601.2133603"},{"issue":"8","key":"4800_CR35","doi-asserted-by":"publisher","first-page":"2386","DOI":"10.1109\/TC.2015.2389960","volume":"65","author":"J Li","year":"2015","unstructured":"Li, J., Li, J., Xie, D., Cai, Z.: Secure auditing and deduplicating data in cloud. IEEE Trans. Comput. 65(8), 2386\u20132396 (2015). https:\/\/doi.org\/10.1109\/TC.2015.2389960","journal-title":"IEEE Trans. Comput."},{"key":"4800_CR36","doi-asserted-by":"publisher","first-page":"26578","DOI":"10.1109\/10.1109\/ACCESS.2018.2836328","volume":"6","author":"TY Youn","year":"2018","unstructured":"Youn, T.Y., Chang, K.Y., Rhee, K.H., Shin, S.U.: Efficient client-side deduplication of encrypted data with public auditing in cloud storage. IEEE Access. 6, 26578\u201326587 (2018). https:\/\/doi.org\/10.1109\/10.1109\/ACCESS.2018.2836328","journal-title":"IEEE Access."},{"key":"4800_CR37","doi-asserted-by":"publisher","first-page":"2203","DOI":"10.1007\/s10586-023-04072-0","volume":"27","author":"J Yu","year":"2023","unstructured":"Yu, J., Shen, W.: Secure cloud storage auditing with deduplication and efficient data transfer. Cluster Comput. 27, 2203\u20132215 (2023). https:\/\/doi.org\/10.1007\/s10586-023-04072-0","journal-title":"Cluster Comput."},{"key":"4800_CR38","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1016\/j.ins.2020.07.005","volume":"541","author":"H Yuan","year":"2020","unstructured":"Yuan, H., Chen, X., Wang, J., Yuan, J., Yan, H., Susilo, W.: Blockchain-based public auditing and secure deduplication with fair arbitration. Inf. Sci. 541, 409\u2013425 (2020). https:\/\/doi.org\/10.1016\/j.ins.2020.07.005","journal-title":"Inf. Sci."},{"issue":"6","key":"4800_CR39","doi-asserted-by":"publisher","first-page":"3941","DOI":"10.1109\/TDSC.2021.3114160","volume":"19","author":"G Tian","year":"2021","unstructured":"Tian, G., Hu, Y., Wei, J., Liu, Z., Huang, X., Chen, X., Susilo, W.: Blockchain-based secure deduplication and shared auditing in decentralized storage. IEEE Trans. Dependable Secur. Comput. 19(6), 3941\u20133954 (2021). https:\/\/doi.org\/10.1109\/TDSC.2021.3114160","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"issue":"8","key":"4800_CR40","doi-asserted-by":"publisher","first-page":"2365","DOI":"10.1109\/TC.2023.3248278","volume":"72","author":"Q Zhang","year":"2023","unstructured":"Zhang, Q., Sui, D., Cui, J., Gul, C., Zhong, H.: Efficient integrity auditing mechanism with secure deduplication for blockchain storage. IEEE Trans. Comput. 72(8), 2365\u20132376 (2023). https:\/\/doi.org\/10.1109\/TC.2023.3248278","journal-title":"IEEE Trans. Comput."},{"issue":"3","key":"4800_CR41","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1016\/j.jksuci.2023.01.021","volume":"35","author":"Z Tu","year":"2023","unstructured":"Tu, Z., Wang, X., Du, W., Wang, Z., Lv, M.: An improved multi-copy cloud data auditing scheme and its application. J. King Saud. Univ. Comput. Inf. Sci. 35(3), 120\u2013130 (2023). https:\/\/doi.org\/10.1016\/j.jksuci.2023.01.021","journal-title":"J. King Saud. Univ. Comput. Inf. Sci."},{"key":"4800_CR42","unstructured":"Nakamoto, S.: Bitcoin(2008) A peer-to-peer electronic cash system.\u00a0"},{"key":"4800_CR43","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1016\/j.future.2019.12.019","volume":"105","author":"Z Zheng","year":"2020","unstructured":"Zheng, Z., Xie, S., Dai, H., Chen, W., Chen, X., Weng, J., Imran, M.: An overview on smart contracts: challenges, advances and platforms. Futur. Gener. Comp. Syst. 105, 475\u2013491 (2020). https:\/\/doi.org\/10.1016\/j.future.2019.12.019","journal-title":"Futur. Gener. Comp. Syst."},{"key":"4800_CR44","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TDSC.2017.2662216","volume":"151","author":"G Wood","year":"2014","unstructured":"Wood, G.: Ethereum: a secure decentralised generalised transaction ledger. Ethereum project yellow paper. 151, 1\u201332 (2014). https:\/\/doi.org\/10.1109\/TDSC.2017.2662216","journal-title":"Ethereum project yellow paper."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-04800-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-024-04800-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-04800-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,10]],"date-time":"2025-01-10T15:12:39Z","timestamp":1736521959000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-024-04800-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,22]]},"references-count":44,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,2]]}},"alternative-id":["4800"],"URL":"https:\/\/doi.org\/10.1007\/s10586-024-04800-0","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,10,22]]},"assertion":[{"value":"5 April 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 July 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 October 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 October 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"We do not have any pertinent financial or non-financial interests to declare.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"33"}}