{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,24]],"date-time":"2025-09-24T08:52:52Z","timestamp":1758703972499,"version":"3.37.3"},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2021,2,17]],"date-time":"2021-02-17T00:00:00Z","timestamp":1613520000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,2,17]],"date-time":"2021-02-17T00:00:00Z","timestamp":1613520000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,5]]},"DOI":"10.1007\/s11042-021-10554-3","type":"journal-article","created":{"date-parts":[[2021,2,19]],"date-time":"2021-02-19T12:39:32Z","timestamp":1613738372000},"page":"18211-18241","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Secure exchange of information using artificial intelligence and chaotic system guided neural synchronization"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4951-4729","authenticated-orcid":false,"given":"Arindam","family":"Sarkar","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,17]]},"reference":[{"key":"10554_CR1","doi-asserted-by":"crossref","unstructured":"Allam A M, Abbas H M, El-Kharashi M W (2013) Authenticated key exchange protocol using neural cryptography with secret boundaries. In: Proceedings of the 2013 international joint conference on neural networks, IJCNN 2013, pp 1\u20138","DOI":"10.1109\/IJCNN.2013.6707125"},{"issue":"3","key":"10554_CR2","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1016\/j.joems.2013.10.003","volume":"22","author":"P Balasubramaniam","year":"2014","unstructured":"Balasubramaniam P, Muthukumar P (2014) Synchronization of chaotic systems using feedback controller: an application to Diffie\u2013Hellman key exchange protocol and ElGamal public key cryptosystem. J Egypt Math Soc 22(3):365\u2013372. https:\/\/doi.org\/10.1016\/j.joems.2013.10.003","journal-title":"J Egypt Math Soc"},{"key":"10554_CR3","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/978-1-4419-5906-5","volume-title":"Cryptology","author":"FL Bauer","year":"2011","unstructured":"Bauer F L (2011) Cryptology. Springer, Boston, pp 283\u2013284. https:\/\/doi.org\/10.1007\/978-1-4419-5906-5"},{"issue":"7","key":"10554_CR4","doi-asserted-by":"publisher","first-page":"1618","DOI":"10.1109\/TNNLS.2016.2546962","volume":"28","author":"H Chen","year":"2017","unstructured":"Chen H, Shi P, Lim C C (2017) Exponential synchronization for Markovian stochastic coupled neural networks of neutral-type via adaptive feedback control. IEEE Trans Neural Netw Learn Syst 28(7):1618\u20131632. https:\/\/doi.org\/10.1109\/TNNLS.2016.2546962","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"issue":"11","key":"10554_CR5","doi-asserted-by":"publisher","first-page":"3246","DOI":"10.1109\/TNNLS.2018.2890269","volume":"30","author":"H Chen","year":"2019","unstructured":"Chen H, Shi P, Lim C C (2019) Cluster synchronization for neutral stochastic delay networks via intermittent adaptive control. IEEE Trans Neural Netw Learn Syst 30(11):3246\u20133259. https:\/\/doi.org\/10.1109\/tnnls.2018.2890269","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"10554_CR6","unstructured":"Cover TM, Thomas JA (2006) Elements of information theory. Wiley series in telecommunications and signal processing, 2nd edn, Wiley-Interscience, New York"},{"key":"10554_CR7","doi-asserted-by":"publisher","unstructured":"Desai D R V (2011) Pseudo random number generator using Elman neural network. In: 2011 IEEE recent advances in intelligent computational systems. https:\/\/doi.org\/10.1109\/RAICS.2011.6069312, pp 251\u2013254","DOI":"10.1109\/RAICS.2011.6069312"},{"issue":"10","key":"10554_CR8","first-page":"165","volume":"2","author":"V Desai","year":"2012","unstructured":"Desai V, Patil R T, Deshmukh V, Rao D (2012) Pseudo random number generator using time delay neural network. WJST 2(10):165\u2013169","journal-title":"WJST"},{"issue":"6","key":"10554_CR9","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffie","year":"1976","unstructured":"Diffie W, Hellman M (1976) New directions in cryptography. IEEE Trans Inf Theory 22(6):644\u2013654. https:\/\/doi.org\/10.1109\/tit.1976.1055638","journal-title":"IEEE Trans Inf Theory"},{"issue":"18","key":"10554_CR10","doi-asserted-by":"publisher","first-page":"20","DOI":"10.5604\/20804075.1049490","volume":"7","author":"M Dolecki","year":"2013","unstructured":"Dolecki M, Kozera R (2013) Distribution of the tree parity machine synchronization time. Adv Sci Technol\u2013 Res J 7(18):20\u201327. https:\/\/doi.org\/10.5604\/20804075.1049490","journal-title":"Adv Sci Technol\u2013 Res J"},{"key":"10554_CR11","doi-asserted-by":"crossref","unstructured":"Dolecki M, Kozera R (2013) Threshold method of detecting long-time TPM synchronization. In: Computer information systems and industrial management, vol 8104. Springer, pp 241\u2013252","DOI":"10.1007\/978-3-642-40925-7_23"},{"key":"10554_CR12","doi-asserted-by":"crossref","unstructured":"Dolecki M, Kozera R (2015) The impact of the TPM weights distribution on network synchronization time. In: Computer information systems and industrial management, vol 9339. Springer International Publishing, pp 451\u2013460","DOI":"10.1007\/978-3-319-24369-6_37"},{"issue":"11","key":"10554_CR13","doi-asserted-by":"publisher","first-page":"4999","DOI":"10.1109\/TNNLS.2019.2955165","volume":"31","author":"T Dong","year":"2020","unstructured":"Dong T, Huang T (2020) Neural cryptography based on complex-valued neural network. IEEE Trans Neural Netw Learn Syst 31(11):4999\u20135004. https:\/\/doi.org\/10.1109\/TNNLS.2019.2955165","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"10554_CR14","doi-asserted-by":"publisher","first-page":"454","DOI":"10.1016\/j.physa.2017.12.008","volume":"495","author":"T Dong","year":"2018","unstructured":"Dong T, Wang A, Zhu H, Liao X (2018) Event-triggered synchronization for reaction\u2013diffusion complex networks via random sampling. Phys A: Stat Mech Appl 495:454\u2013462. https:\/\/doi.org\/10.1016\/j.physa.2017.12.008","journal-title":"Phys A: Stat Mech Appl"},{"issue":"1","key":"10554_CR15","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1515\/gcc-2012-0001","volume":"4","author":"M Eftekhari","year":"2012","unstructured":"Eftekhari M (2012) A Diffie\u2013Hellman key exchange protocol using matrices over noncommutative rings. Groups - Complexity - Cryptology 4(1):167\u2013176. https:\/\/doi.org\/10.1515\/gcc-2012-0001","journal-title":"Groups - Complexity - Cryptology"},{"key":"10554_CR16","doi-asserted-by":"publisher","first-page":"20665","DOI":"10.1007\/s11042-019-08322-5","volume":"79","author":"IF Elashry","year":"2020","unstructured":"Elashry I F, El-Shafai W, Hasan E S (2020) Efficient chaotic-based image cryptosystem with different modes of operation. Multimed Tools Appl 79:20665\u201320687. https:\/\/doi.org\/10.1007\/s11042-019-08322-5","journal-title":"Multimed Tools Appl"},{"key":"10554_CR17","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139164542","volume-title":"Statistical mechanics of learning","author":"A Engel","year":"2012","unstructured":"Engel A, den Broeck C V (2012) Statistical mechanics of learning. Cambridge University Press, Cambridge. https:\/\/doi.org\/10.1017\/CBO9781139164542"},{"key":"10554_CR18","doi-asserted-by":"publisher","first-page":"430","DOI":"10.1016\/j.vlsi.2017.01.010","volume":"58","author":"H Gomez","year":"2017","unstructured":"Gomez H, Reyes \u00d3scar, Roa E (2017) A 65 nm CMOS key establishment core based on tree parity machines. Integration 58:430\u2013437. https:\/\/doi.org\/10.1016\/j.vlsi.2017.01.010","journal-title":"Integration"},{"key":"10554_CR19","doi-asserted-by":"publisher","unstructured":"Jeong Y, Oh K, Cho C, Choi H (2018) Pseudo Random Number Generation Using LSTMs and Irrational Numbers. In: 2018 IEEE International Conference on Big Data and Smart Computing (BigComp), pp 541\u2013544, DOI https:\/\/doi.org\/10.1109\/BigComp.2018.00091, (to appear in print)","DOI":"10.1109\/BigComp.2018.00091"},{"key":"10554_CR20","doi-asserted-by":"publisher","first-page":"20263","DOI":"10.1007\/s11042-020-08879-6","volume":"79","author":"A Kamrani","year":"2020","unstructured":"Kamrani A, Zenkouar K, Najah S (2020) A new set of image encryption algorithms based on discrete orthogonal moments and Chaos theory. Multimed Tools Appl 79:20263\u201320279. https:\/\/doi.org\/10.1007\/s11042-020-08879-6","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"10554_CR21","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1209\/epl\/i2002-00552-9","volume":"57","author":"I Kanter","year":"2002","unstructured":"Kanter I, Kinzel W, Kanter E (2002) Secure exchange of information by synchronization of neural networks. Europhys Lett (EPL) 57(1):141\u2013147. https:\/\/doi.org\/10.1209\/epl\/i2002-00552-9","journal-title":"Europhys Lett (EPL)"},{"key":"10554_CR22","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/j.chaos.2018.12.021","volume":"119","author":"B Karakaya","year":"2019","unstructured":"Karakaya B, G\u00fclten A, Frasca M (2019) A true random bit generator based on a memristive chaotic circuit: analysis, design and FPGA implementation. Chaos Solitons Fractals 119:143\u2013149","journal-title":"Chaos Solitons Fractals"},{"key":"10554_CR23","doi-asserted-by":"crossref","unstructured":"Kinzel W, Kanter I (2002) Interacting neural networks and cryptography. Advances in Solid State Physics, pp 383\u2013391","DOI":"10.1007\/3-540-45618-X_30"},{"key":"10554_CR24","doi-asserted-by":"crossref","unstructured":"Klimov A, Mityagin A, Shamir A (2002) Analysis of neural cryptography. In: Proceedings of the international conference on the theory and application of cryptology and information security, pp 288\u2013298","DOI":"10.1007\/3-540-36178-2_18"},{"issue":"1","key":"10554_CR25","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1109\/TNNLS.2016.2619345","volume":"29","author":"S Lakshmanan","year":"2018","unstructured":"Lakshmanan S, Prakash M, Lim C P, Rakkiyappan R, Balasubramaniam P, Nahavandi S (2018) Synchronization of an inertial neural network with time-varying delays and its application to secure communication. IEEE Trans Neural Netw Learn Syst 29(1):195\u2013207. https:\/\/doi.org\/10.1109\/tnnls.2016.2619345","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"10554_CR26","unstructured":"Lindell Y, Katz J (2014) Introduction to modern cryptography. Chapman and Hall\/CRC"},{"issue":"10","key":"10554_CR27","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1049\/iet-ifs.2014.0192","volume":"2","author":"L Liu","year":"2016","unstructured":"Liu L, Miao S, Hu H, Deng Y (2016) Pseudo-random bit generator based on non-stationary logistic maps. IET Inf Secur 2(10):87\u201394","journal-title":"IET Inf Secur"},{"issue":"8","key":"10554_CR28","doi-asserted-by":"publisher","first-page":"2358","DOI":"10.1109\/TNNLS.2018.2884620","volume":"30","author":"P Liu","year":"2019","unstructured":"Liu P, Zeng Z, Wang J (2019) Global synchronization of coupled fractional-order recurrent neural networks. IEEE Trans Neural Netw Learn Syst 30(8):2358\u20132368. https:\/\/doi.org\/10.1109\/TNNLS.2018.2884620","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"issue":"8","key":"10554_CR29","first-page":"55","volume":"16","author":"F Meneses","year":"2016","unstructured":"Meneses F, Fuertes W, Sancho J (2016) RSA encryption algorithm optimization to improve performance and security level of network messages. IJCSNS 16(8):55\u201355","journal-title":"IJCSNS"},{"key":"10554_CR30","doi-asserted-by":"publisher","unstructured":"Mu N, Liao X (2013) An approach for designing neural cryptography. In: Gou C, Hou ZG, Zeng Z (eds) Advances in neural networks \u2013 ISNN 2013. ISNN 2013. Lecture Notes in Computer Science. https:\/\/doi.org\/10.1007\/978-3-642-39065-4_13, vol 7951. Springer, Berlin, Heidelberg, pp 99\u2013108","DOI":"10.1007\/978-3-642-39065-4_13"},{"key":"10554_CR31","doi-asserted-by":"publisher","unstructured":"Mu N, Liao X, Huang T (2013) Approach to design neural cryptography: a generalized architecture and a heuristic rule. Phys Rev E 87(6). https:\/\/doi.org\/10.1103\/physreve.87.062804","DOI":"10.1103\/physreve.87.062804"},{"issue":"9","key":"10554_CR32","doi-asserted-by":"publisher","first-page":"2684","DOI":"10.1109\/TNNLS.2018.2885530","volume":"30","author":"Z Ni","year":"2019","unstructured":"Ni Z, Paul S (2019) A multistage game in smart grid security: a reinforcement learning solution. IEEE Trans Neural Netw Learn Syst 30(9):2684\u20132695. https:\/\/doi.org\/10.1109\/tnnls.2018.2885530","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"10554_CR33","doi-asserted-by":"publisher","unstructured":"Niemiec M (2019) Error correction in quantum cryptography based on artificial neural networks. Quantum Inf Process 174. https:\/\/doi.org\/10.1007\/s11128-019-2296-4","DOI":"10.1007\/s11128-019-2296-4"},{"key":"10554_CR34","unstructured":"NIST (2020) NIST Statistical Test. http:\/\/csrc.nist.gov\/groups\/ST\/toolkit\/rng\/stats_tests.html"},{"key":"10554_CR35","first-page":"441","volume":"33","author":"V Patidar","year":"2009","unstructured":"Patidar V, Sud K K, Pareek N K (2009) A pseudo random bit generator based on chaotic logistic map and its statistical testing. Informatica 33:441\u2013452","journal-title":"Informatica"},{"issue":"19","key":"10554_CR36","doi-asserted-by":"publisher","first-page":"19881","DOI":"10.1007\/s11042-016-3728-0","volume":"76","author":"X Pu","year":"2017","unstructured":"Pu X, Tian X J, Zhang J, Liu C Y, Yin J (2017) Chaotic multimedia stream cipher scheme based on true random sequence combined with tree parity machine. Multimed Tools Appl 76(19):19881\u201319885. https:\/\/doi.org\/10.1007\/s11042-016-3728-0","journal-title":"Multimed Tools Appl"},{"key":"10554_CR37","doi-asserted-by":"publisher","unstructured":"Rana S, Mishra D (2020) Secure and ubiquitous authenticated content distribution framework for IoT enabled DRM system. Multimed Tools App. https:\/\/doi.org\/10.1007\/s11042-020-08683-2","DOI":"10.1007\/s11042-020-08683-2"},{"issue":"47","key":"10554_CR38","doi-asserted-by":"publisher","first-page":"L707","DOI":"10.1088\/0305-4470\/35\/47\/104","volume":"35","author":"M Rosen-Zvi","year":"2002","unstructured":"Rosen-Zvi M, Kanter I, Kinzel W (2002) Cryptography based on neural networks analytical results. J Phys A: Math Gen 35(47):L707\u2013L713. https:\/\/doi.org\/10.1088\/0305-4470\/35\/47\/104","journal-title":"J Phys A: Math Gen"},{"key":"10554_CR39","unstructured":"Ruttor A (2007) Neural synchronization and cryptography. https:\/\/arxiv.org\/abs\/0711.2411"},{"key":"10554_CR40","doi-asserted-by":"publisher","unstructured":"Ruttor A, Kinzel W, Naeh R, Kanter I (2006) Genetic attack on neural cryptography. Phys Rev E 73(3). https:\/\/doi.org\/10.1103\/physreve.73.036121","DOI":"10.1103\/physreve.73.036121"},{"key":"10554_CR41","first-page":"207","volume":"536","author":"S Santhanalakshmi","year":"2015","unstructured":"Santhanalakshmi S, Sangeeta K, Patra G K (2015) Analysis of neural synchroniz ation using genetic approach for secure key generation. Commun Comput Inf Sci 536:207\u2013216","journal-title":"Commun Comput Inf Sci"},{"key":"10554_CR42","doi-asserted-by":"crossref","unstructured":"Steiner M, Tsudik G, Waidner M (1996) Diffie-Hellman key distribution extended to group communication. In: Proceedings of the 3rd ACM conference, pp 31\u201337","DOI":"10.1145\/238168.238182"},{"key":"10554_CR43","doi-asserted-by":"publisher","unstructured":"Tirdad A S K (2010a) Hopfield neural networks as pseudo random number generators. https:\/\/doi.org\/10.1109\/NAFIPS.2010.5548182","DOI":"10.1109\/NAFIPS.2010.5548182"},{"key":"10554_CR44","doi-asserted-by":"publisher","unstructured":"Tirdad A S K (2010b) Hopfield neural networks as pseudo random number generators. In: 2010 Annual meeting of the North American fuzzy information processing society. https:\/\/doi.org\/10.1109\/NAFIPS.2010.5548182, pp 1\u20136","DOI":"10.1109\/NAFIPS.2010.5548182"},{"key":"10554_CR45","first-page":"52","volume":"74","author":"A Wang","year":"2016","unstructured":"Wang A, Dong T, Liao X (2016) Event-triggered synchronization strategy for complex dynamical networks with the Markovian switching topologies. IEEE Trans Neural Netw Learn Syst 74:52\u201357","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"issue":"2","key":"10554_CR46","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1109\/TNNLS.2016.2626466","volume":"29","author":"J Wang","year":"2018","unstructured":"Wang J, Cheng L M, Su T (2018) Multivariate cryptography based on clipped hopfield neural network. IEEE Trans Neural Netw Learn Syst 29 (2):353\u2013363. https:\/\/doi.org\/10.1109\/tnnls.2016.2626466","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"issue":"8","key":"10554_CR47","doi-asserted-by":"publisher","first-page":"2434","DOI":"10.1109\/TNNLS.2018.2884954","volume":"30","author":"JL Wang","year":"2019","unstructured":"Wang J L, Qin Z, Wu H N, Huang T (2019) Passivity and synchronization of coupled uncertain reaction-diffusion neural networks with multiple time delays. IEEE Trans Neural Netw Learn Syst 30(8):2434\u20132448. https:\/\/doi.org\/10.1109\/TNNLS.2018.2884954","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"issue":"6","key":"10554_CR48","doi-asserted-by":"publisher","first-page":"1854","DOI":"10.1109\/TNNLS.2018.2874982","volume":"30","author":"Q Xiao","year":"2019","unstructured":"Xiao Q, Huang T, Zeng Z (2019) Global exponential stability and synchronization for discrete-time inertial neural networks with time delays: a timescale approach. IEEE Trans Neural Netw Learn Syst 30(6):1854\u20131866. https:\/\/doi.org\/10.1109\/TNNLS.2018.2874982","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"10554_CR49","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.neucom.2019.09.034","volume":"373","author":"ALZ Zhang","year":"2020","unstructured":"Zhang A L Z (2020) Further study on finite-time synchronization for delayed inertial neural networks via inequality skills. Neurocomputing 373:15\u201323. https:\/\/doi.org\/10.1016\/j.neucom.2019.09.034","journal-title":"Neurocomputing"},{"issue":"5","key":"10554_CR50","doi-asserted-by":"publisher","first-page":"1476","DOI":"10.1109\/TNNLS.2018.2868800","volume":"30","author":"Z Zhang","year":"2019","unstructured":"Zhang Z, Cao J (2019) Novel finite-time synchronization criteria for inertial neural networks with time delays via integral inequality method. IEEE Trans Neural Netw Learn Syst 30(5):1476\u20131485. https:\/\/doi.org\/10.1109\/TNNLS.2018.2868800","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"10554_CR51","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1016\/j.neucom.2018.08.063","volume":"318","author":"Z Zhang","year":"2018","unstructured":"Zhang Z, Li A, Yu S (2018) Finite-time synchronization for delayed complex-valued neural networks via integrating inequality method. Neurocomputing 318:248\u2013260. https:\/\/doi.org\/10.1016\/j.neucom.2018.08.063","journal-title":"Neurocomputing"},{"key":"10554_CR52","doi-asserted-by":"publisher","unstructured":"Zhou X, Tang X (2011) Research and implementation of RSA algorithm for encryption and decryption. In: Proceedings of the 6th international forum on strategic technology. https:\/\/doi.org\/10.1109\/IFOST.2011.6021216. IEEE, pp 1118\u20131121","DOI":"10.1109\/IFOST.2011.6021216"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10554-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-10554-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10554-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,20]],"date-time":"2021-05-20T09:08:16Z","timestamp":1621501696000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-10554-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,17]]},"references-count":52,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2021,5]]}},"alternative-id":["10554"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-10554-3","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2021,2,17]]},"assertion":[{"value":"27 April 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 January 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 January 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 February 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}