{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,20]],"date-time":"2026-05-20T16:32:06Z","timestamp":1779294726707,"version":"3.51.4"},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2023,7,31]],"date-time":"2023-07-31T00:00:00Z","timestamp":1690761600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,7,31]],"date-time":"2023-07-31T00:00:00Z","timestamp":1690761600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Grid Computing"],"published-print":{"date-parts":[[2023,9]]},"DOI":"10.1007\/s10723-023-09678-7","type":"journal-article","created":{"date-parts":[[2023,7,31]],"date-time":"2023-07-31T13:02:19Z","timestamp":1690808539000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["Blockchain Assisted Cloud Security and Privacy Preservation using Hybridized Encryption and Deep Learning Mechanism in IoT-Healthcare Application"],"prefix":"10.1007","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-1100-3154","authenticated-orcid":false,"given":"K.","family":"Raju","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"N.","family":"Ramshankar","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"J. Anvar","family":"Shathik","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"R.","family":"Lavanya","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2023,7,31]]},"reference":[{"issue":"7","key":"9678_CR1","doi-asserted-by":"publisher","first-page":"4798","DOI":"10.1109\/TII.2021.3117285","volume":"18","author":"H Bi","year":"2022","unstructured":"Bi, H., Liu, J., Kato, N.: Deep Learning-Based Privacy Preservation and Data Analytics for IoT Enabled Healthcare. IEEE Trans. Industr. Inf. 18(7), 4798\u20134807 (2022)","journal-title":"IEEE Trans. Industr. Inf."},{"key":"9678_CR2","doi-asserted-by":"crossref","unstructured":"Alkadi, O, Moustafa, N., Turnbull, B., Choo K. -K. R.: A Deep Blockchain Framework-Enabled Collaborative Intrusion Detection for Protecting IoT and Cloud Networks. IEEE Internet Things J. 8(12), 9463\u20139472 (2021)","DOI":"10.1109\/JIOT.2020.2996590"},{"key":"9678_CR3","doi-asserted-by":"crossref","unstructured":"Pamarthi, Satyanarayana, Narmadha, R.: Adaptive Key Management-Based Cryptographic Algorithm for Privacy Preservation in Wireless Mobile Adhoc Networks for IoT Applications. Wirel. Pers. Commun. 124, 349\u2013376 (2022)","DOI":"10.1007\/s11277-021-09360-9"},{"key":"9678_CR4","doi-asserted-by":"crossref","unstructured":"Abirami, P., Vijay Bhanu, S.: Enhancing cloud security using crypto-deep neural network for privacy preservation in trusted environment. Soft Comput. 24, 18927\u201318936 (2020)","DOI":"10.1007\/s00500-020-05122-0"},{"key":"9678_CR5","doi-asserted-by":"crossref","unstructured":"Sudhakar, Rayapati Venkata, Malleswara Rao, T. Ch.: Security aware index based quasi\u2013identifier approach for privacy preservation of data sets for cloud applications. Cluster Comput. 23, 2579\u20132589 (2020)","DOI":"10.1007\/s10586-019-03028-7"},{"issue":"7","key":"9678_CR6","doi-asserted-by":"publisher","first-page":"1040","DOI":"10.1109\/TC.2011.121","volume":"61","author":"K Ma","year":"2012","unstructured":"Ma, K., Liang, H., Wu, K.: Homomorphic Property-Based Concurrent Error Detection of RSA: A Countermeasure to Fault Attack. IEEE Trans. Comput. 61(7), 1040\u20131049 (2012)","journal-title":"IEEE Trans. Comput."},{"key":"9678_CR7","doi-asserted-by":"crossref","unstructured":"Singh, Anuj Kumar, Nayyar, Anand, Garg, Ankit.: A secure elliptic curve based anonymous authentication and key establishment mechanism for IoT and cloud. Multimed. Tools Applic. 82(15),\u00a01\u201352 (2022).","DOI":"10.1007\/s11042-022-14140-z"},{"key":"9678_CR8","doi-asserted-by":"publisher","first-page":"2283","DOI":"10.1007\/s10586-017-0986-1","volume":"20","author":"D Liao","year":"2017","unstructured":"Liao, D., Sun, G., Li, H., Hongfang, Yu., Chang, V.: The framework and algorithm for preserving user trajectory while using location-based services in IoT-cloud systems. Clust. Comput. 20, 2283\u20132297 (2017)","journal-title":"Clust. Comput."},{"key":"9678_CR9","doi-asserted-by":"publisher","first-page":"815","DOI":"10.1007\/s10619-021-07352-z","volume":"40","author":"V Sarala","year":"2022","unstructured":"Sarala, V., Shanmugapriya, P.: DLFPM-SSO-PE: privacy-preserving and security of intermediate data in cloud storage. Distrib. Parallel Databases 40, 815\u2013833 (2022)","journal-title":"Distrib. Parallel Databases"},{"key":"9678_CR10","doi-asserted-by":"crossref","unstructured":"Sathya, A., Kanaga Suba Raja, S.: Privacy Preservation-Based Access Control Intelligence for Cloud Data Storage in Smart Healthcare Infrastructure. Wirel. Pers. Commun. 118, 3595\u20133614 (2021).","DOI":"10.1007\/s11277-021-08278-6"},{"key":"9678_CR11","doi-asserted-by":"crossref","unstructured":"AtifMoqurrab, Syed, Tariq, Noshina, Anjum, Adeel, Asheralieva, Alia, Malik, Saif U. R., Malik, Hassan, Pervaiz, Haris, Singh Gill, Sukhpal: A Deep Learning-Based Privacy-Preserving Model for Smart Healthcare in Internet of Medical Things Using Fog Computing. Wirel. Pers. Commun. 126, 2379\u20132401 (2022).","DOI":"10.1007\/s11277-021-09323-0"},{"key":"9678_CR12","doi-asserted-by":"crossref","unstructured":"Ranjith, J., Mahantesh, K.: Blockchain-based Knapsack System for Security and Privacy Preserving to Medical Data. SN Comput. Science 2, 245 (2021).","DOI":"10.1007\/s42979-021-00568-x"},{"key":"9678_CR13","doi-asserted-by":"crossref","unstructured":"Subramanian, E. K., Tamilselvan, Latha: Elliptic curve Diffie\u2013Hellman cryptosystem in big data cloud security. Clust. Comput. 23, 3057\u20133067 (2020).","DOI":"10.1007\/s10586-020-03069-3"},{"key":"9678_CR14","doi-asserted-by":"crossref","unstructured":"Senthilkumar, G., Tamilarasi, K., Kaviarasan, S., Arun, M.: Trusty authentication of devices using blockchain-cloud of things (B-CoT) for fulfilling commercial services. Int. J. Syst. Assur. Eng. Manag. (2022).","DOI":"10.1007\/s13198-022-01774-3"},{"key":"9678_CR15","doi-asserted-by":"publisher","first-page":"1173","DOI":"10.1007\/s00607-021-01041-6","volume":"104","author":"S Shukla","year":"2022","unstructured":"Shukla, S., Patel, S.J.: A novel ECC-based provably secure and privacy-preserving multi-factor authentication protocol for cloud computing. Computing 104, 1173\u20131202 (2022)","journal-title":"Computing"},{"key":"9678_CR16","doi-asserted-by":"crossref","unstructured":"Nagesh, Puvvada, Srinivasu, N.: Modelling a secure framework for data verification and integrity in cloud environment. Int. J. Syst. Assur. Eng. Manag. (2022).","DOI":"10.1007\/s13198-022-01753-8"},{"key":"9678_CR17","doi-asserted-by":"crossref","unstructured":"Ghorbel, Amal, Ghorbel, Mahmoud, Jmaiel, Mohamed: Accountable privacy preserving attribute-based access control for cloud services enforced using blockchain. Int. J. Inf. Secur. 21, 489\u2013508 (2022).","DOI":"10.1007\/s10207-021-00565-4"},{"key":"9678_CR18","doi-asserted-by":"publisher","first-page":"102355","DOI":"10.1016\/j.ipm.2020.102355","volume":"57","author":"Q Zhao","year":"2020","unstructured":"Zhao, Q., Chen, S., Liu, Z., Baker, T., Zhang, Y.: Blockchain-based privacy-preserving remote data integritychecking scheme for IoT information systems. Inf. Process. Manage. 57, 102355 (2020)","journal-title":"Inf. Process. Manage."},{"key":"9678_CR19","doi-asserted-by":"crossref","unstructured":"vv, K. L.: Blockchain-based Chaotic Deep GAN Encryption scheme for securing medical images in a cloud environment. Appl. Intell. 53,\u00a04733\u20134747 (2022)\u00a0","DOI":"10.1007\/s10489-022-03730-x"},{"key":"9678_CR20","doi-asserted-by":"crossref","first-page":"7180","DOI":"10.53730\/ijhs.v6nS1.6545","volume":"6","author":"KS Shalini","year":"2022","unstructured":"Shalini, K.S., Nithya, M.: An integrated approach of block chain technology with machine learning and cloud computing for handling healthcare data. Int. J. Health Sci. 6, 7180\u20137190 (2022)","journal-title":"Int. J. Health Sci."},{"key":"9678_CR21","doi-asserted-by":"crossref","unstructured":"Grover, Bharti, Kushwaha, Dileep Kumar: Authorization and privacy preservation in cloud-based distributed ehr system using blockchain technology and anonymous digital ring signature. Health Serv. Outcomes Res. Methodol. 23,\u00a0227\u2013240 (2022).","DOI":"10.1007\/s10742-022-00281-z"},{"key":"9678_CR22","first-page":"10","volume":"6112815","author":"M Mustafa","year":"2022","unstructured":"Mustafa, M., Alshare, M., Bhargava, D., Neware, R., Singh, B., Ngulube, P.: Perceived Security Risk Based on Moderating Factors forBlockchain Technology Applications in Cloud Storage to AchieveSecure Healthcare Systems. Comput. Math. Methods Med. 6112815, 10 (2022)","journal-title":"Comput. Math. Methods Med."},{"key":"9678_CR23","doi-asserted-by":"crossref","unstructured":"Kwabena, O.-A., Qin, Z., Zhuang, T., Qin, Z.: MSCryptoNet: Multi-Scheme privacy-preserving deep learning in cloud computing. IEEE Access 1\u20131 7,\u00a029344\u201329354 (2019).","DOI":"10.1109\/ACCESS.2019.2901219"},{"key":"9678_CR24","doi-asserted-by":"crossref","unstructured":"Abirami, P., Bhanu, S. Vijay: Enhancing cloud security using crypto-deep neural network for privacy preservation in trusted environment. Soft Comput. 24, 18927\u201318936 (2020).","DOI":"10.1007\/s00500-020-05122-0"},{"key":"9678_CR25","doi-asserted-by":"crossref","unstructured":"Xu, M., Zou, Z., Cheng, Y., Hu, Q., Yu, D., Cheng, X.: SPDL: A Blockchain-enabled Secure and Privacy-preserving Decentralized Learning System. IEEE Trans. Comput. 11 (2022).","DOI":"10.1109\/TC.2022.3169436"},{"key":"9678_CR26","doi-asserted-by":"publisher","first-page":"89769","DOI":"10.1109\/ACCESS.2022.3201525","volume":"10","author":"Y Song","year":"2022","unstructured":"Song, Y., Park, S., Sullivan, M.B., Kim, J.: SEC-BADAEC: An Efficient ECC With No Vacancy for Strong Memory Protection. IEEE Access 10, 89769\u201389780 (2022)","journal-title":"IEEE Access"},{"issue":"5","key":"9678_CR27","doi-asserted-by":"publisher","first-page":"478","DOI":"10.1109\/TST.2014.6919824","volume":"19","author":"Y Yang","year":"2014","unstructured":"Yang, Y., Zhang, S., Yang, J., Li, J., Li, Z.: Targeted fully homomorphic encryption based on a Double Decryption Algorithm for polynomials. Tsinghua Sci. Technol. 19(5), 478\u2013485 (2014)","journal-title":"Tsinghua Sci. Technol."},{"key":"9678_CR28","doi-asserted-by":"crossref","unstructured":"Po\u0142ap, Dawid, Woz\u00b4niak, Marcin: Polar Bear Optimization Algorithm: Meta-Heuristic with Fast Population Movement and Dynamic Birth and Death Mechanism. Symmetry 9, 203 (2017)","DOI":"10.3390\/sym9100203"},{"key":"9678_CR29","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.swevo.2016.01.002","volume":"28","author":"A Sharma","year":"2016","unstructured":"Sharma, A., Sharma, A., Panigrahi, B.K., Kiran, D., Kumar, R.: Ageist Spider Monkey Optimization algorithm. Swarm Evol. Comput. 28, 58\u201377 (2016)","journal-title":"Swarm Evol. Comput."},{"key":"9678_CR30","doi-asserted-by":"publisher","first-page":"96811","DOI":"10.1109\/ACCESS.2020.2994252","volume":"8","author":"Q Jin","year":"2020","unstructured":"Jin, Q., Xue, X., Peng, W., Cai, W., Zhang, Y., Zhang, L.: TBLC-rAttention: A Deep Neural Network Model for Recognizing the Emotional Tendency of Chinese Medical Comment. IEEE Access 8, 96811\u201396828 (2020)","journal-title":"IEEE Access"},{"key":"9678_CR31","doi-asserted-by":"publisher","first-page":"33362","DOI":"10.1109\/ACCESS.2022.3162424","volume":"10","author":"C-J Chen","year":"2022","unstructured":"Chen, C.-J., Chou, F.-I., Chou, J.-H.: Temperature Prediction for Reheating Furnace by Gated Recurrent Unit Approach. IEEE Access 10, 33362\u201333369 (2022)","journal-title":"IEEE Access"},{"issue":"6","key":"9678_CR32","doi-asserted-by":"publisher","first-page":"1046","DOI":"10.1109\/TMAG.2007.914855","volume":"44","author":"J-H Seo","year":"2008","unstructured":"Seo, J.-H., Im, C.-H., Kwak, S.-Y., Lee, C.-G., Jung, H.-K.: An Improved Particle Swarm Optimization Algorithm Mimicking Territorial Dispute Between Groups for Multimodal Function Optimization Problems. IEEE Trans. Magn. 44(6), 1046\u20131049 (2008)","journal-title":"IEEE Trans. Magn."},{"issue":"4","key":"9678_CR33","doi-asserted-by":"publisher","first-page":"4979","DOI":"10.1109\/JESTPE.2020.3036405","volume":"9","author":"R Motamarri","year":"2021","unstructured":"Motamarri, R., Bhookya, N.: JAYA Algorithm Based on L\u00e9vy Flight for Global MPPT Under Partial Shading in Photovoltaic System. IEEE J. Emerg. Sel. Top. Power Electron. 9(4), 4979\u20134991 (2021)","journal-title":"IEEE J. Emerg. Sel. Top. Power Electron."},{"issue":"9","key":"9678_CR34","doi-asserted-by":"publisher","first-page":"1443","DOI":"10.1109\/TLA.2021.9468436","volume":"19","author":"C Equihua","year":"2021","unstructured":"Equihua, C., et al.: A low-cost and highly compact FPGA-based encryption\/decryption architecture for AES algorithm. IEEE Lat. Am. Trans. 19(9), 1443\u20131450 (2021)","journal-title":"IEEE Lat. Am. Trans."},{"issue":"1","key":"9678_CR35","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1109\/TPEL.2022.3203480","volume":"38","author":"GS Lee","year":"2023","unstructured":"Lee, G.S., Kim, S., Bae, S.: Efficient Design Method for a Forward-Converter Transformer Based on a KNN\u2013GRU\u2013DNN Model. IEEE Trans. Power Electron. 38(1), 73\u201378 (2023)","journal-title":"IEEE Trans. Power Electron."},{"issue":"10","key":"9678_CR36","first-page":"972","volume":"62","author":"X Huang","year":"2015","unstructured":"Huang, X., Wang, W.: A Novel and Efficient Design for an RSA Cryptosystem With a Very Large Key Size. IEEE Trans. Circuits Syst. II Express Briefs 62(10), 972\u2013976 (2015)","journal-title":"IEEE Trans. Circuits Syst. II Express Briefs"},{"key":"9678_CR37","doi-asserted-by":"publisher","first-page":"26059","DOI":"10.1109\/ACCESS.2018.2832854","volume":"6","author":"H Tang","year":"2018","unstructured":"Tang, H., Sun, Q.T., Yang, X., Long, K.: A Network Coding and DES Based Dynamic Encryption Scheme for Moving Target Defense. IEEE Access 6, 26059\u201326068 (2018)","journal-title":"IEEE Access"},{"key":"9678_CR38","doi-asserted-by":"crossref","unstructured":"Almaiah, Mohammed Amin, Ali, Aitizaz, Hajjej, Fahima, Pasha, Muhammad Fermi, Alohali, Manal Abdullah: A Lightweight Hybrid Deep Learning Privacy Preserving Model for FC-Based Industrial Internet of Medical Things. Sensors 22(6), 2112 (2022)","DOI":"10.3390\/s22062112"},{"key":"9678_CR39","doi-asserted-by":"crossref","unstructured":"Almaiah, Mohammed Amin, Hajjej, Fahima, Ali, Aitizaz, Pasha, Muhammad Fermi, Almomani, Omar: A Novel Hybrid Trustworthy Decentralized Authentication and Data Preservation Model for Digital Healthcare IoT Based CPS. Sensors 22(4), 1448 (2022)","DOI":"10.3390\/s22041448"},{"key":"9678_CR40","doi-asserted-by":"crossref","unstructured":"Almaiah, Mohammed Amin, Hajjej, Fahima, Ali, Aitizaz, Pasha, Muhammad Fermi, Almomani, Omar: An AI\u2010Enabled Hybrid Lightweight Authentication Model for Digital Healthcare Using Industrial Internet of Things Cyber\u2010Physical Systems. Sensors 22, 1448 (2022).","DOI":"10.3390\/s22041448"},{"key":"9678_CR41","doi-asserted-by":"crossref","unstructured":"Ali, Aitizaz, Pasha, Muhammad Fermi, Ali, Jehad, Fang, Ong Huey, Masud, Mehedi, Jurcut, Anca Delia, Alzain, Mohammed A.: Deep Learning Based Homomorphic Secure Search-Able Encryption for Keyword Search in Blockchain Healthcare System: A Novel Approach to Cryptography. Sensors 22(2), 528 (2022)","DOI":"10.3390\/s22020528"},{"key":"9678_CR42","doi-asserted-by":"crossref","unstructured":"Ali, Aitizaz, Almaiah, Mohammed Amin, Hajjej, Pasha, Muhammad Fermi, Fang, Ong Huey, Khan, Rahim, Teo, Jason, Zakarya, Muhammad: An Industrial IoT-Based Blockchain-Enabled Secure Searchable Encryption Approach for Healthcare Systems Using Neural Network. Sensors 22(2), 572 (2022)","DOI":"10.3390\/s22020572"},{"key":"9678_CR43","doi-asserted-by":"crossref","unstructured":"Wang, Weizheng, Xu, Hao, Alazab, Mamoun, Gadekallu, Thippa Reddy, Han, Zhaoyang, Su, Chunhua: Blockchain-Based Reliable and Efficient Certificateless Signature for IIoT Devices. IEEE Trans. Ind. Inf. 18(10), 7059-7067 (2021)","DOI":"10.1109\/TII.2021.3084753"},{"key":"9678_CR44","doi-asserted-by":"crossref","unstructured":"Wang, Weizheng, Chen, Qiu, Yin, Zhimeng, Srivastava, Gautam, Gadekallu, Thippa Reddy, Su, Fawaz Alsolami Chunhua: Blockchain and PUF-based lightweight authentication protocol for wireless medical sensor networks. IEEE Internet Things J. 9(11), 8883-8891 (2021)","DOI":"10.1109\/JIOT.2021.3117762"},{"key":"9678_CR45","doi-asserted-by":"crossref","unstructured":"Lian, Zhuotao, Wang, Weizheng, Han, Zhaoyang, Su, Chunhua: Blockchain-Based Personalized Federated Learning for Internet of Medical Things. IEEE Trans. Sustain. Comput. (Early Access) 1\u20139 (2023)","DOI":"10.1109\/TSUSC.2023.3279111"},{"key":"9678_CR46","doi-asserted-by":"crossref","unstructured":"Wang, Weizheng, Huang, Huakun, Yin, Zhimeng, Gadekallu, Thippa Reddy, Alazab, Mamoun, Su, Chunhua: Smart contract token-based privacy-preserving access control system for industrial Internet of Things. Digit. Commun. Netw. 9(2), 337-346 (2023)","DOI":"10.1016\/j.dcan.2022.10.005"},{"key":"9678_CR47","doi-asserted-by":"crossref","unstructured":"Escorcia-Gutierrez, Jos\u00e9, Mansour, Romany F., Leal, Esmeide, Villanueva, Jair, Jimenez-Cabas, Javier, Soto, Carlos, Soto-D\u00edaz, Roosvel: Privacy Preserving Blockchain with Energy Aware Clustering Scheme for IoT Healthcare Systems. Mob. Netw. Applic. (2023)","DOI":"10.1007\/s11036-023-02115-9"},{"key":"9678_CR48","doi-asserted-by":"crossref","unstructured":"Lakhan, Abdullah, Mohammed, Mazin Abed, Nedoma, Jan, Senior Member, Martinek, Radek, Senior Membe, Tiwari, Prayag, Member, Vidyarthi, Ankit, Alkhayyat, Ahmed, Wang, Weiyu: Federated-Learning Based Privacy Preservation and Fraud-Enabled Blockchain IoMT System for Healthcare. IEEE J. Biomed. Health Inf. 27(2) (2023).","DOI":"10.1109\/JBHI.2022.3165945"},{"key":"9678_CR49","doi-asserted-by":"publisher","first-page":"100693","DOI":"10.1016\/j.iot.2023.100693","volume":"22","author":"HS Trivedi","year":"2023","unstructured":"Trivedi, H.S., Patel, S.J.: Homomorphic cryptosystem-based secure data processing model for edge-assisted IoT healthcare systems. Internet Things 22, 100693 (2023)","journal-title":"Internet Things"}],"container-title":["Journal of Grid Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10723-023-09678-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10723-023-09678-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10723-023-09678-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,25]],"date-time":"2024-10-25T11:02:15Z","timestamp":1729854135000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10723-023-09678-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,31]]},"references-count":49,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,9]]}},"alternative-id":["9678"],"URL":"https:\/\/doi.org\/10.1007\/s10723-023-09678-7","relation":{},"ISSN":["1570-7873","1572-9184"],"issn-type":[{"value":"1570-7873","type":"print"},{"value":"1572-9184","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,7,31]]},"assertion":[{"value":"9 May 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 June 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 July 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not Applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics Approval and Consent to Participate"}},{"value":"Not Applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for Publication"}},{"value":"The authors declare no conflict of interest.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}}],"article-number":"45"}}