{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T07:38:22Z","timestamp":1765438702347,"version":"3.37.3"},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2021,1,22]],"date-time":"2021-01-22T00:00:00Z","timestamp":1611273600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,1,22]],"date-time":"2021-01-22T00:00:00Z","timestamp":1611273600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,4]]},"DOI":"10.1007\/s11042-020-10320-x","type":"journal-article","created":{"date-parts":[[2021,1,22]],"date-time":"2021-01-22T08:03:27Z","timestamp":1611302607000},"page":"14163-14189","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["An enhanced and provably secure authentication protocol using Chebyshev chaotic maps for multi-server environment"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3073-3614","authenticated-orcid":false,"given":"Ashish","family":"Kumar","sequence":"first","affiliation":[]},{"given":"Hari","family":"Om","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,22]]},"reference":[{"key":"10320_CR1","doi-asserted-by":"crossref","unstructured":"Abadi M, Blanchet B, Comon-Lundh H (2009) Models and proofs of protocol security: A progress report. In: International conference on computer aided verification. Springer, pp 35\u201349","DOI":"10.1007\/978-3-642-02658-4_5"},{"key":"10320_CR2","doi-asserted-by":"crossref","unstructured":"Abadi M, Fournet C (2001) Mobile values, new names, and secure communication. In: ACM Sigplan Notices, vol 36, pp 104\u2013115","DOI":"10.1145\/373243.360213"},{"key":"10320_CR3","doi-asserted-by":"crossref","unstructured":"Abdalla M, Fouque P. -A., Pointcheval D (2005) Password-based authenticated key exchange in the three-party setting. In: International workshop on public key cryptography. Springer, pp 65\u201384","DOI":"10.1007\/978-3-540-30580-4_6"},{"key":"10320_CR4","doi-asserted-by":"publisher","first-page":"107993","DOI":"10.1109\/ACCESS.2020.3000716","volume":"8","author":"Z Ali","year":"2020","unstructured":"Ali Z, Hussain S, Rehman RHU, Munshi A, Liaqat M, Kumar N, Chaudhry SA (2020) ITSSAKA-MS: An improved three-factor symmetric-key based secure AKA scheme for multi-server environments. IEEE Access 8:107993\u2013108003","journal-title":"IEEE Access"},{"issue":"1","key":"10320_CR5","first-page":"172","volume":"18","author":"R Amin","year":"2016","unstructured":"Amin R (2016) Cryptanalysis and efficient dynamic id based remote user authentication scheme in multi-server environment using smart card. IJ Network Security 18(1):172\u2013181","journal-title":"IJ Network Security"},{"issue":"1","key":"10320_CR6","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1007\/s11277-015-2616-7","volume":"84","author":"R Amin","year":"2015","unstructured":"Amin R, Biswas GP (2015) Design and analysis of bilinear pairing based mutual authentication and key agreement protocol usable in multi-server environment. Wirel Pers Commun 84(1):439\u2013462","journal-title":"Wirel Pers Commun"},{"key":"10320_CR7","doi-asserted-by":"crossref","unstructured":"Amin R, Islam SK, Khan MK, Karati A, Giri D, Kumari S (2017) A two-factor RSA-based robust authentication system for multiserver environments. Secur Commun Netw","DOI":"10.1155\/2017\/5989151"},{"issue":"1-2","key":"10320_CR8","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1016\/S0375-9601(98)00086-3","volume":"240","author":"MS Baptista","year":"1998","unstructured":"Baptista MS (1998) Cryptography with chaos. Phys Lett A 240 (1-2):50\u201354","journal-title":"Phys Lett A"},{"key":"10320_CR9","doi-asserted-by":"publisher","first-page":"1382","DOI":"10.1109\/TCSI.2005.851701","volume":"52","author":"P Bergamo","year":"2005","unstructured":"Bergamo P, D\u2019Arco P, Santis AD, Kocarev L (2005) Security of public-key cryptosystems based on Chebyshev polynomials. IEEE Trans Circuits Sys 52:1382\u20131393","journal-title":"IEEE Trans Circuits Sys"},{"key":"10320_CR10","doi-asserted-by":"crossref","unstructured":"Canetti R, Krawczyk H (2001) Analysis of key-exchange protocols and their use for building secure channels. In: Advances in cryptology \u2013 Eurocrypt, Lecture notes in computer science, vol 2045. Springer, pp 453\u2013474. http:\/\/eprint.iacr.org\/2001\/040.ps.gz","DOI":"10.1007\/3-540-44987-6_28"},{"issue":"2","key":"10320_CR11","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1002\/dac.2830","volume":"29","author":"CC Chang","year":"2016","unstructured":"Chang CC, Cheng TF, Hsueh WY (2016) A robust and efficient dynamic identity-based multi-server authentication scheme using smart cards. Int J Commun Syst 29(2):290\u2013306","journal-title":"Int J Commun Syst"},{"issue":"5","key":"10320_CR12","doi-asserted-by":"publisher","first-page":"824","DOI":"10.1109\/TDSC.2016.2616876","volume":"15","author":"S Chatterjee","year":"2016","unstructured":"Chatterjee S, Roy S, Das AK, Chattopadhyay S, Kumar N, Vasilakos AV (2016) Secure biometric-based authentication scheme using Chebyshev chaotic map for multi-server environment. IEEE Trans Dependable Secure Comput 15 (5):824\u2013839","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"8","key":"10320_CR13","doi-asserted-by":"publisher","first-page":"1608","DOI":"10.1002\/sec.1109","volume":"8","author":"CT Chen","year":"2015","unstructured":"Chen CT, Lee CC (2015) A two-factor authentication scheme with anonymity for multi-server environments. Secur Commun Netw 8(8):1608\u20131625","journal-title":"Secur Commun Netw"},{"issue":"2","key":"10320_CR14","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev D, Yao A (1983) On the security of public key protocols. IEEE Trans Inf Theory 29(2):198\u2013208","journal-title":"IEEE Trans Inf Theory"},{"issue":"1","key":"10320_CR15","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/s11277-015-3040-8","volume":"87","author":"PC Gupta","year":"2016","unstructured":"Gupta PC, Dhar J (2016) Hash based multi-server key exchange protocol using smart card. Wirel Pers Commun 87(1):225\u2013244","journal-title":"Wirel Pers Commun"},{"issue":"3","key":"10320_CR16","doi-asserted-by":"publisher","first-page":"890","DOI":"10.1007\/s11036-018-1145-5","volume":"24","author":"A Hassan","year":"2019","unstructured":"Hassan A, Omala AA, Ali M, Jin C, Li F (2019) Identity-based user authenticated key agreement protocol for multi-server environment with anonymity. Mobile Netw Appl 24(3):890\u2013902","journal-title":"Mobile Netw Appl"},{"issue":"1","key":"10320_CR17","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/s11227-014-1135-8","volume":"70","author":"WB Hsieh","year":"2014","unstructured":"Hsieh WB, Leu JS (2014) An anonymous mobile user authentication protocol using selfcertified public keys based on multi-server architectures. J Supercomput 70(1):133\u2013148","journal-title":"J Supercomput"},{"issue":"2","key":"10320_CR18","doi-asserted-by":"publisher","first-page":"811","DOI":"10.1007\/s13369-017-2764-z","volume":"43","author":"A Irshad","year":"2018","unstructured":"Irshad A, Chaudhry SA, Xie Q, Li X, Farash MS, Kumari S, Wu F (2018) An enhanced and provably secure chaotic map-based authenticated key agreement in multi-server architecture. Arab J Sci Eng 43(2):811\u2013828","journal-title":"Arab J Sci Eng"},{"issue":"3","key":"10320_CR19","doi-asserted-by":"publisher","first-page":"3185","DOI":"10.1007\/s11277-017-3990-0","volume":"95","author":"A Irshad","year":"2017","unstructured":"Irshad A, Sher M, Ashraf MU, Alzahrani BA, Wu F, Xie Q, Kumari S (2017) An improved and secure chaotic-map based multi-server authentication protocol based on Lu et al. and Tsai and Lo\u201d Scheme. Wirel Pers Commun 95 (3):3185\u20133208","journal-title":"Wirel Pers Commun"},{"issue":"4","key":"10320_CR20","doi-asserted-by":"publisher","first-page":"1623","DOI":"10.1007\/s11227-016-1688-9","volume":"72","author":"A Irshad","year":"2016","unstructured":"Irshad A, Sher M, Chaudhary SA, Naqvi H, Farash MS (2016) An efficient and anonymous multi-server authenticated key agreement based on chaotic map without engaging Registration Centre. J Supercomput 72(4):1623\u20131644","journal-title":"J Supercomput"},{"issue":"1","key":"10320_CR21","doi-asserted-by":"publisher","first-page":"1167","DOI":"10.1007\/s11042-016-4236-y","volume":"77","author":"A Irshad","year":"2018","unstructured":"Irshad A, Sher M, Chaudhry SA, Xie Q, Kumari S, Wu F (2018) An improved and secure chaotic map based authenticated key agreement in multi-server architecture. Multimed Tools Appl 77(1):1167\u20131204","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"10320_CR22","doi-asserted-by":"publisher","first-page":"1975","DOI":"10.1007\/s11277-014-1968-8","volume":"79","author":"SH Islam","year":"2014","unstructured":"Islam SH (2014) A provably secure ID-based mutual authentication and key agreement scheme for mobile multi-server environment without ESL attack. Wirel Pers Commun 79(3):1975\u20131991","journal-title":"Wirel Pers Commun"},{"issue":"3","key":"10320_CR23","doi-asserted-by":"publisher","first-page":"2735","DOI":"10.1007\/s11277-017-3956-2","volume":"95","author":"S Jangirala","year":"2017","unstructured":"Jangirala S, Mukhopadhyay S, Das AK (2017) A multi-server environment with secure and efficient remote user authentication scheme based on dynamic ID using smart cards. Wirel Pers Commun 95(3):2735\u20132767","journal-title":"Wirel Pers Commun"},{"issue":"11","key":"10320_CR24","doi-asserted-by":"publisher","first-page":"2245","DOI":"10.1016\/j.patcog.2004.04.011","volume":"37","author":"ATB Jina","year":"2004","unstructured":"Jina ATB, Linga DNC, Goh A (2004) Biohashing: Two factor authentication featuring fingerprint data and tokenised random number. Pattern Recogn 37(11):2245\u20132255","journal-title":"Pattern Recogn"},{"key":"10320_CR25","doi-asserted-by":"crossref","unstructured":"Kocher P, Jaffe J, Jun B (1999) Differential power analysis. In: Proceedings of advances in cryptology - CRYPTO \u201999, LNCS, Santa Barbara, California, USA, vol 1666, pp 388\u2013397","DOI":"10.1007\/3-540-48405-1_25"},{"issue":"1","key":"10320_CR26","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1016\/j.dcan.2017.09.004","volume":"4","author":"A Kumar","year":"2018","unstructured":"Kumar A, Om H (2018) An improved and secure multiserver authentication scheme based on biometrics and smartcard. Digital Commun Netw 4 (1):27\u201338","journal-title":"Digital Commun Netw"},{"issue":"22","key":"10320_CR27","doi-asserted-by":"publisher","first-page":"31649","DOI":"10.1007\/s11042-019-07949-8","volume":"78","author":"TF Lee","year":"2019","unstructured":"Lee TF, Diao YY, Hsieh YP (2019) A ticket-based multi-server biometric authentication scheme using extended chaotic maps for telecare medical information systems. Multimed Tools Appl 78(22):31649\u201331672","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"10320_CR28","doi-asserted-by":"publisher","first-page":"853","DOI":"10.1007\/s11071-013-1174-3","volume":"76","author":"CC Lee","year":"2014","unstructured":"Lee CC, Lou DC, Li CT, Hsu CW (2014) An extended chaotic-maps-based protocol with key agreement for multiserver environments. Nonlinear Dynamics 76(1):853\u2013866","journal-title":"Nonlinear Dynamics"},{"issue":"14","key":"10320_CR29","doi-asserted-by":"publisher","first-page":"2276","DOI":"10.1002\/sec.1487","volume":"9","author":"CT Li","year":"2016","unstructured":"Li CT (2016) A secure chaotic maps-based privacy-protection scheme for multi-server environments. Secur Commun Netw 9(14):2276\u20132290","journal-title":"Secur Commun Netw"},{"issue":"6","key":"10320_CR30","doi-asserted-by":"publisher","first-page":"1498","DOI":"10.1109\/72.963786","volume":"12","author":"LH Li","year":"2001","unstructured":"Li LH, Lin IC, Hwang MS (2001) A remote password authentication scheme for multi-server architecture using neural networks. IEEE Trans Neural Netw 12(6):1498\u20131504","journal-title":"IEEE Trans Neural Netw"},{"issue":"2","key":"10320_CR31","doi-asserted-by":"publisher","first-page":"569","DOI":"10.1007\/s11277-016-3293-x","volume":"89","author":"X Li","year":"2016","unstructured":"Li X, Niu J, Kumari S, Islam SH, Wu F, Khan MK, Das AK (2016) A novel chaotic maps-based user authentication and key agreement protocol for multi-server environments with provable security. Wirel Pers Commun 89 (2):569\u2013597","journal-title":"Wirel Pers Commun"},{"issue":"1","key":"10320_CR32","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/S0167-739X(02)00093-6","volume":"19","author":"IC Lin","year":"2003","unstructured":"Lin IC, Hwang MS, Li LH (2003) A new remote user authentication scheme for multi-server architecture. Futur Gener Comput Syst 19(1):13\u201322","journal-title":"Futur Gener Comput Syst"},{"issue":"11","key":"10320_CR33","doi-asserted-by":"publisher","first-page":"1321","DOI":"10.1002\/sec.1417","volume":"9","author":"Y Lu","year":"2016","unstructured":"Lu Y, Li L, Peng H, Yang Y (2016) Cryptanalysis and improvement of a chaotic maps-based anonymous authenticated key agreement protocol for multiserver architecture. Secur Commun Netw 9(11):1321\u20131330","journal-title":"Secur Commun Netw"},{"issue":"17","key":"10320_CR34","doi-asserted-by":"publisher","first-page":"4615","DOI":"10.1002\/sec.1653","volume":"9","author":"T Maitra","year":"2016","unstructured":"Maitra T, Islam SH, Amin R, Giri D, Khan MK, Kumar N (2016) An enhanced multi-server authentication protocol using password and smart-card: Cryptanalysis and design. Secur Commun Netw 9(17):4615\u20134638","journal-title":"Secur Commun Netw"},{"issue":"5","key":"10320_CR35","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"TS Messerges","year":"2002","unstructured":"Messerges TS, Dabbish EA, Sloan RH (2002) Examining smart-card security under the threat of power analysis attacks. IEEE Trans Comput 51(5):541\u2013552","journal-title":"IEEE Trans Comput"},{"issue":"12","key":"10320_CR36","doi-asserted-by":"publisher","first-page":"e0145263","DOI":"10.1371\/journal.pone.0145263","volume":"10","author":"J Moon","year":"2015","unstructured":"Moon J, Choi Y, Jung J, Won D (2015) An improvement of robust biometrics-based authentication and key agreement scheme for multi-server environments using smart cards. PloS one 10(12):e0145263","journal-title":"PloS one"},{"key":"10320_CR37","doi-asserted-by":"crossref","unstructured":"Pointcheval D, Zimmer S (2008) Multi-factor authenticated key exchange. In: International conference on applied cryptography and network security. Springer, New York, pp 277\u2013295","DOI":"10.1007\/978-3-540-68914-0_17"},{"issue":"19","key":"10320_CR38","doi-asserted-by":"publisher","first-page":"27553","DOI":"10.1007\/s11042-019-07812-w","volume":"78","author":"M Qi","year":"2019","unstructured":"Qi M, Chen J (2019) Anonymous biometrics-based authentication with key agreement scheme for multi-server environment using ECC. Multimed Tools Appl 78(19):27553\u201327568","journal-title":"Multimed Tools Appl"},{"key":"10320_CR39","doi-asserted-by":"publisher","first-page":"3622","DOI":"10.1109\/ACCESS.2017.2666258","volume":"5","author":"AG Reddy","year":"2017","unstructured":"Reddy AG, Yoon EJ, Das AK, Odelu V, Yoo KY (2017) Design of mutually authenticated key agreement protocol resistant to impersonation attacks for multi-server environment. IEEE access 5:3622\u20133639","journal-title":"IEEE access"},{"issue":"3","key":"10320_CR40","doi-asserted-by":"publisher","first-page":"1307","DOI":"10.1007\/s11277-018-5764-8","volume":"101","author":"SS Sahoo","year":"2018","unstructured":"Sahoo SS, Mohanty S, Majhi B (2018) An improved and secure two-factor dynamic id based authenticated key agreement scheme for multiserver environment. Wirel Pers Commun 101(3):1307\u20131333","journal-title":"Wirel Pers Commun"},{"key":"10320_CR41","volume-title":"Cryptography and network security: Principles and practices","author":"W Stallings","year":"2003","unstructured":"Stallings W (2003) Cryptography and network security: Principles and practices, 3rd edn. Englewood Cliffs, Prentice Hall","edition":"3rd edn."},{"key":"10320_CR42","doi-asserted-by":"crossref","unstructured":"Sudhakar T, Natarajan V (2019) A new three-factor authentication and key agreement protocol for multi-server environment. Wirel Netw 1\u201312","DOI":"10.1007\/s11276-018-01922-3"},{"issue":"17","key":"10320_CR43","doi-asserted-by":"publisher","first-page":"e3358","DOI":"10.1002\/dac.3358","volume":"30","author":"V Suresh kumar","year":"2017","unstructured":"Suresh kumar V, Amin R, Anitha R (2017) An enhanced bilinear pairing based authenticated key agreement protocol for multiserver environment. Int J Commun Syst 30(17):e3358","journal-title":"Int J Commun Syst"},{"issue":"11","key":"10320_CR44","doi-asserted-by":"publisher","first-page":"1384","DOI":"10.1002\/sec.1424","volume":"9","author":"Z Tan","year":"2016","unstructured":"Tan Z (2016) A privacy-preserving multi-server authenticated key-agreement scheme based on Chebyshev chaotic maps. Secur Commun Netw 9(11):1384\u20131397","journal-title":"Secur Commun Netw"},{"issue":"13","key":"10320_CR45","doi-asserted-by":"publisher","first-page":"1955","DOI":"10.1002\/dac.2829","volume":"28","author":"JL Tsai","year":"2015","unstructured":"Tsai JL, Lo NW (2015) A chaotic map-based anonymous multi-server authenticated key agreement protocol using smart card. Int J Commun Syst 28(13):1955\u20131963","journal-title":"Int J Commun Syst"},{"issue":"2","key":"10320_CR46","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/s11277-011-0456-7","volume":"68","author":"B Wang","year":"2013","unstructured":"Wang B, Ma M (2013) A smart card based efficient and secured multi-server authentication scheme. Wirel Pers Commun 68(2):361\u2013378","journal-title":"Wirel Pers Commun"},{"issue":"6","key":"10320_CR47","doi-asserted-by":"publisher","first-page":"1382","DOI":"10.1109\/TIFS.2017.2659640","volume":"12","author":"Q Xie","year":"2017","unstructured":"Xie Q, Wong DS, Wang G, Tan X, Chen K, Fang L (2017) Provably secure dynamic ID-based anonymous two-factor authenticated key exchange protocol with extended security model. IEEE Trans Inf Forensics Secur 12(6):1382\u20131392","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"10320_CR48","doi-asserted-by":"crossref","unstructured":"Xu Z, He D, Huang X (2017) Secure and efficient two-factor authentication protocol using RSA signature for multi-server environments. In: International conference on information and communications security. Springer, Cham, pp 595\u2013605","DOI":"10.1007\/978-3-319-89500-0_51"},{"issue":"1","key":"10320_CR49","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/s11227-010-0512-1","volume":"63","author":"E Yoon","year":"2013","unstructured":"Yoon E, Yoo K (2013) Robust biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem. J Supercomput 63(1):235\u2013255","journal-title":"J Supercomput"},{"key":"10320_CR50","doi-asserted-by":"publisher","first-page":"669","DOI":"10.1016\/j.chaos.2006.09.047","volume":"37","author":"L Zhang","year":"2008","unstructured":"Zhang L (2008) Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos Solitons Fractals 37:669\u2013674","journal-title":"Chaos Solitons Fractals"},{"issue":"1-2","key":"10320_CR51","doi-asserted-by":"publisher","first-page":"835","DOI":"10.1007\/s11071-015-2198-7","volume":"82","author":"H Zhu","year":"2015","unstructured":"Zhu H (2015) A provable privacy-protection system for multi-server environment. Nonlinear Dynamics 82(1-2):835\u2013849","journal-title":"Nonlinear Dynamics"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10320-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-10320-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10320-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,28]],"date-time":"2023-01-28T14:48:01Z","timestamp":1674917281000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-10320-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,22]]},"references-count":51,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2021,4]]}},"alternative-id":["10320"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-10320-x","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2021,1,22]]},"assertion":[{"value":"28 January 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 September 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 December 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 January 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}