{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T14:04:19Z","timestamp":1773842659270,"version":"3.50.1"},"reference-count":54,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2022,2,24]],"date-time":"2022-02-24T00:00:00Z","timestamp":1645660800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,2,24]],"date-time":"2022-02-24T00:00:00Z","timestamp":1645660800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2022,4]]},"DOI":"10.1007\/s11042-022-11927-y","type":"journal-article","created":{"date-parts":[[2022,2,24]],"date-time":"2022-02-24T14:03:56Z","timestamp":1645711436000},"page":"13823-13843","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["A novel protocol for efficient authentication in cloud-based IoT devices"],"prefix":"10.1007","volume":"81","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8596-907X","authenticated-orcid":false,"given":"Irfan","family":"Alam","sequence":"first","affiliation":[]},{"given":"Manoj","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,2,24]]},"reference":[{"key":"11927_CR1","doi-asserted-by":"publisher","first-page":"8189","DOI":"10.1007\/s13369-021-05442-9","volume":"46","author":"AM Almuhaideb","year":"2021","unstructured":"Almuhaideb AM (2021) Re-AuTh: lightweight re-authentication with practical key Management for Wireless Body Area Networks. Arab J Sci Eng 46:8189\u20138202. https:\/\/doi.org\/10.1007\/s13369-021-05442-9","journal-title":"Arab J Sci Eng"},{"key":"11927_CR2","doi-asserted-by":"publisher","first-page":"3017","DOI":"10.1007\/s13369-020-04905-9","volume":"46","author":"BA Alzahrani","year":"2021","unstructured":"Alzahrani BA (2021) Secure and efficient cloud-based IoT authenticated key agreement scheme for e-health wireless sensor networks. Arab J Sci Eng 46:3017\u20133032. https:\/\/doi.org\/10.1007\/s13369-020-04905-9","journal-title":"Arab J Sci Eng"},{"key":"11927_CR3","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.adhoc.2015.05.020","volume":"36","author":"R Amin","year":"2016","unstructured":"Amin R, Biswas GP (2016) A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks. Ad Hoc Netw 36:58\u201380. https:\/\/doi.org\/10.1016\/j.adhoc.2015.05.020","journal-title":"Ad Hoc Netw"},{"key":"11927_CR4","doi-asserted-by":"publisher","first-page":"1005","DOI":"10.1016\/j.future.2016.12.028","volume":"78","author":"R Amin","year":"2018","unstructured":"Amin R, Kumar N, Biswas GP, Iqbal R, Chang V (2018) A light weight authentication protocol for IoT-enabled devices in distributed cloud computing environment. Futur Gener Comput Syst 78:1005\u20131019. https:\/\/doi.org\/10.1016\/j.future.2016.12.028","journal-title":"Futur Gener Comput Syst"},{"key":"11927_CR5","unstructured":"Alessandro Armando, David Basin, Jorge Cuellar MR and LV (2001) The high level protocol specification language deliverable details. Avispa"},{"key":"11927_CR6","doi-asserted-by":"crossref","unstructured":"Armando A, Basin D, Boichut Y, et al (2005) The AVISPA tool for the automated validation of Internet security Protocols and applications. Pp 281\u2013285","DOI":"10.1007\/11513988_27"},{"key":"11927_CR7","doi-asserted-by":"publisher","first-page":"15793","DOI":"10.1007\/s11042-017-5548-2","volume":"79","author":"W Bae","year":"2020","unstructured":"Bae W, Kwak J (2020) Smart card-based secure authentication protocol in multi-server IoT environment. Multimed Tools Appl 79:15793\u201315811. https:\/\/doi.org\/10.1007\/s11042-017-5548-2","journal-title":"Multimed Tools Appl"},{"key":"11927_CR8","doi-asserted-by":"publisher","first-page":"8739","DOI":"10.1109\/JIOT.2019.2923373","volume":"6","author":"S Banerjee","year":"2019","unstructured":"Banerjee S, Odelu V, Das AK, Srinivas J, Kumar N, Chattopadhyay S, Choo KKR (2019) A provably secure and lightweight anonymous user authenticated session key exchange scheme for Internet of things deployment. IEEE Internet Things J 6:8739\u20138752. https:\/\/doi.org\/10.1109\/JIOT.2019.2923373","journal-title":"IEEE Internet Things J"},{"key":"11927_CR9","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M Burrows","year":"1990","unstructured":"Burrows M, Abadi M, Needham R (1990) A logic of authentication. ACM Trans Comput Syst 8:18\u201336. https:\/\/doi.org\/10.1145\/77648.77649","journal-title":"ACM Trans Comput Syst"},{"key":"11927_CR10","doi-asserted-by":"publisher","first-page":"1267","DOI":"10.1016\/j.future.2018.04.019","volume":"108","author":"S Challa","year":"2020","unstructured":"Challa S, Das AK, Gope P, Kumar N, Wu F, Vasilakos AV (2020) Design and analysis of authenticated key agreement scheme in cloud-assisted cyber\u2013physical systems. Futur Gener Comput Syst 108:1267\u20131286. https:\/\/doi.org\/10.1016\/j.future.2018.04.019","journal-title":"Futur Gener Comput Syst"},{"key":"11927_CR11","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1109\/TWC.2015.2473165","volume":"15","author":"CC Chang","year":"2016","unstructured":"Chang CC, Le HD (2016) A provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks. IEEE Trans Wirel Commun 15:357\u2013366. https:\/\/doi.org\/10.1109\/TWC.2015.2473165","journal-title":"IEEE Trans Wirel Commun"},{"key":"11927_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2021\/5580939","volume":"2021","author":"F Chen","year":"2021","unstructured":"Chen F, Tang Y, Cheng X, Xie D, Wang T, Zhao C (2021) Blockchain-based efficient device authentication protocol for medical cyber-physical systems. Secur Commun Networks 2021:1\u201313. https:\/\/doi.org\/10.1155\/2021\/5580939","journal-title":"Secur Commun Networks"},{"key":"11927_CR13","unstructured":"Chevalier Y, Compagna L, Cuellar J, et al (2006) A High Level Protocol Specification Language for Industrial Security-Sensitive Protocols To cite this version: HAL Id: inria-00099882 A High-Level Protocol Specification Language for Industrial Security-Sensitive Protocols \u2217. https:\/\/hal.inria.fr\/inria-00100219"},{"key":"11927_CR14","unstructured":"Chintala RR, Kallepalli H, Kotapati J, et al (2021) Implementing security framework for cloud based IOT network implementing security framework for cloud based IOT network"},{"key":"11927_CR15","doi-asserted-by":"publisher","first-page":"4785","DOI":"10.3233\/JIFS-200694","volume":"39","author":"C Do Xuan","year":"2020","unstructured":"Do Xuan C, Dao MH, Nguyen HD (2020) APT attack detection based on flow network analysis techniques using deep learning. J Intell Fuzzy Syst 39:4785\u20134801. https:\/\/doi.org\/10.3233\/JIFS-200694","journal-title":"J Intell Fuzzy Syst"},{"key":"11927_CR16","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev D, Yao AC (1983) On the security of public key Protocols. IEEE Trans Inf Theory 29:198\u2013208. https:\/\/doi.org\/10.1109\/TIT.1983.1056650","journal-title":"IEEE Trans Inf Theory"},{"key":"11927_CR17","doi-asserted-by":"crossref","unstructured":"Gadicha AB, Gupta VBB, Gadicha VB, et al (2021) Multimode approach of data encryption in images through quantum steganography. Pp 99\u2013124","DOI":"10.4018\/978-1-7998-7160-6.ch005"},{"key":"11927_CR18","unstructured":"Haack C (2008) What is BAN logic ? Verification of security Protocols what are questions that BAN logic aims to answer ? What are limitations of BAN logic ? BAN logic \u2019 s model of time formulas: syntax domains formulas: basic formulas formulas: idealized messages"},{"key":"11927_CR19","doi-asserted-by":"crossref","unstructured":"Hankerson D, Menezes A (2011) Elliptic curve cryptography. In: Encyclopedia of cryptography and security. Springer US, Boston, MA, pp. 397\u2013397","DOI":"10.1007\/978-1-4419-5906-5_245"},{"key":"11927_CR20","unstructured":"Internet A, Protocols S (2006) HLPSL Tutorial. In: Society"},{"key":"11927_CR21","doi-asserted-by":"publisher","first-page":"10250","DOI":"10.1109\/JIOT.2020.2997651","volume":"7","author":"W Iqbal","year":"2020","unstructured":"Iqbal W, Abbas H, Daneshmand M, Rauf B, Bangash YA (2020) An in-depth analysis of IoT security requirements, challenges, and their countermeasures via software-defined security. IEEE Internet Things J 7:10250\u201310276. https:\/\/doi.org\/10.1109\/JIOT.2020.2997651","journal-title":"IEEE Internet Things J"},{"key":"11927_CR22","doi-asserted-by":"publisher","unstructured":"Irshad A, Ahmad HF, Ramzan MS (2016) An efficient and anonymous Chaotic Map based authenticated key agreement for multi-server architecture KSII Trans Internet Inf Syst 10. https:\/\/doi.org\/10.3837\/tiis.2016.12.023","DOI":"10.3837\/tiis.2016.12.023"},{"key":"11927_CR23","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1016\/j.proeng.2012.01.890","volume":"30","author":"SKH Islam","year":"2012","unstructured":"Islam SKH, Biswas GP (2012) An improved pairing-free identity-based authenticated key agreement protocol based on ECC. Procedia Eng 30:499\u2013507. https:\/\/doi.org\/10.1016\/j.proeng.2012.01.890","journal-title":"Procedia Eng"},{"key":"11927_CR24","doi-asserted-by":"publisher","first-page":"3107","DOI":"10.1007\/s11042-018-5630-4","volume":"78","author":"H Kim","year":"2019","unstructured":"Kim H, Kim D, Yi O, Kim J (2019) Cryptanalysis of hash functions based on blockciphers suitable for IoT service platform security. Multimed Tools Appl 78:3107\u20133130. https:\/\/doi.org\/10.1007\/s11042-018-5630-4","journal-title":"Multimed Tools Appl"},{"key":"11927_CR25","doi-asserted-by":"crossref","unstructured":"Kocher P, Jaffe J, Jun B (1999) Differential power. Analysis pp:388\u2013397","DOI":"10.1007\/3-540-48405-1_25"},{"key":"11927_CR26","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/MCE.2020.3003127","volume":"10","author":"RK Koppanati","year":"2021","unstructured":"Koppanati RK, Kumar K (2021) P-MEC: polynomial congruence-based multimedia encryption technique over cloud. IEEE Consum Electron Mag 10:41\u201346. https:\/\/doi.org\/10.1109\/MCE.2020.3003127","journal-title":"IEEE Consum Electron Mag"},{"key":"11927_CR27","doi-asserted-by":"crossref","unstructured":"Kumar K, Kurhekar M (2016) Economically efficient virtualization over cloud using Docker containers. In: 2016 IEEE international conference on cloud computing in emerging markets (CCEM). IEEE, pp 95\u2013100","DOI":"10.1109\/CCEM.2016.025"},{"key":"11927_CR28","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1007\/s12652-017-0460-1","volume":"9","author":"S Kumari","year":"2018","unstructured":"Kumari S, Karuppiah M, Das AK, Li X, Wu F, Gupta V (2018) Design of a secure anonymity-preserving authentication scheme for session initiation protocol using elliptic curve cryptography. J Ambient Intell Humaniz Comput 9:643\u2013653. https:\/\/doi.org\/10.1007\/s12652-017-0460-1","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"11927_CR29","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L Lamport","year":"1981","unstructured":"Lamport L (1981) Password authentication with insecure communication. Commun ACM 24:770\u2013772. https:\/\/doi.org\/10.1145\/358790.358797","journal-title":"Commun ACM"},{"key":"11927_CR30","doi-asserted-by":"publisher","first-page":"2719","DOI":"10.3837\/tiis.2015.07.022","volume":"9","author":"H Li","year":"2015","unstructured":"Li H, Li F, Song C, Yan Y (2015) Towards smart card based mutual authentication schemes in cloud computing. KSII Trans Internet Inf Syst 9:2719\u20132735. https:\/\/doi.org\/10.3837\/tiis.2015.07.022","journal-title":"KSII Trans Internet Inf Syst"},{"key":"11927_CR31","doi-asserted-by":"crossref","unstructured":"Manupriya P, Sinha S, Kumar K (2017) V\u2295SEE: Video secret sharing encryption technique. In: 2017 Conference on information and communication technology (CICT). IEEE, pp 1\u20136","DOI":"10.1109\/INFOCOMTECH.2017.8340639"},{"key":"11927_CR32","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"TS Messerges","year":"2002","unstructured":"Messerges TS, Dabbish EA, Sloan RH (2002) Examining smart-card security under the threat of power analysis attacks. IEEE Trans Comput 51:541\u2013552. https:\/\/doi.org\/10.1109\/TC.2002.1004593","journal-title":"IEEE Trans Comput"},{"key":"11927_CR33","doi-asserted-by":"crossref","unstructured":"Miller VS (1986) Use of elliptic curves in cryptography. In: Advances in cryptology \u2014 CRYPTO \u201885 proceedings. Springer Berlin Heidelberg, Berlin, Heidelberg, pp. 417\u2013426","DOI":"10.1007\/3-540-39799-X_31"},{"key":"11927_CR34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/MCE.2021.3089880","volume":"2248","author":"G Muhammad","year":"2021","unstructured":"Muhammad G, Alhussein M (2021) Security, trust, and privacy for the Internet of vehicles: a deep learning approach. IEEE Consum Electron Mag 2248:1\u20131. https:\/\/doi.org\/10.1109\/MCE.2021.3089880","journal-title":"IEEE Consum Electron Mag"},{"key":"11927_CR35","doi-asserted-by":"publisher","first-page":"151054","DOI":"10.1109\/ACCESS.2019.2947723","volume":"7","author":"T Nandy","year":"2019","unstructured":"Nandy T, Yamani M, Bin I et al (2019) Review on security of Internet of things authentication mechanism. IEEE Access 7:151054\u2013151089. https:\/\/doi.org\/10.1109\/ACCESS.2019.2947723","journal-title":"IEEE Access"},{"key":"11927_CR36","doi-asserted-by":"publisher","first-page":"8233","DOI":"10.1007\/s13369-021-05446-5","volume":"46","author":"O Naseer","year":"2021","unstructured":"Naseer O, Ullah S, Anjum L (2021) Blockchain-based decentralized lightweight control access scheme for smart grids. Arab J Sci Eng 46:8233\u20138243. https:\/\/doi.org\/10.1007\/s13369-021-05446-5","journal-title":"Arab J Sci Eng"},{"key":"11927_CR37","doi-asserted-by":"crossref","unstructured":"Pete P, Patange K, Wankhade M et al (2018) 3E-VMC: an experimental energy efficient model for VMs scheduling over cloud. In: 2018 first international conference on secure cyber computing and communication (ICSCCC). IEEE:322\u2013327","DOI":"10.1109\/ICSCCC.2018.8703358"},{"key":"11927_CR38","doi-asserted-by":"publisher","first-page":"3865","DOI":"10.1007\/s13369-020-05276-x","volume":"46","author":"D Rangwani","year":"2021","unstructured":"Rangwani D, Om H (2021) A secure user authentication protocol based on ECC for cloud computing environment. Arab J Sci Eng 46:3865\u20133888. https:\/\/doi.org\/10.1007\/s13369-020-05276-x","journal-title":"Arab J Sci Eng"},{"key":"11927_CR39","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.fcij.2017.02.001","volume":"1","author":"PP Ray","year":"2017","unstructured":"Ray PP (2017) A survey of IoT cloud platforms. Futur Comput Informatics J 1:35\u201346. https:\/\/doi.org\/10.1016\/j.fcij.2017.02.001","journal-title":"Futur Comput Informatics J"},{"key":"11927_CR40","doi-asserted-by":"crossref","unstructured":"Sharma S, Kumar K (2018) GUESS: genetic uses in video encryption with secret sharing. In: Advances in Intelligent Systems and Computing. Springer Verlag, pp. 51\u201362","DOI":"10.1007\/978-981-10-7895-8_5"},{"key":"11927_CR41","doi-asserted-by":"publisher","first-page":"851","DOI":"10.1007\/978-3-540-24707-4_98","volume":"3043","author":"JM Sierra","year":"2004","unstructured":"Sierra JM, Hern\u00e1ndez JC, Alcaide A, Torres J (2004) Validating the use of BAN LOGIC. Lect Notes Comput Sci (including Subser Lect Notes Artif Intell Lect Notes Bioinformatics) 3043:851\u2013858. https:\/\/doi.org\/10.1007\/978-3-540-24707-4_98","journal-title":"Lect Notes Comput Sci (including Subser Lect Notes Artif Intell Lect Notes Bioinformatics)"},{"key":"11927_CR42","doi-asserted-by":"publisher","first-page":"1365","DOI":"10.12785\/amis\/070414","volume":"7","author":"H Sun","year":"2013","unstructured":"Sun H, Wen Q, Zhang H, Jin Z (2013) A novel remote user authentication and key agreement scheme for mobile client-server environment. Appl math. Inf Sci 7:1365\u20131374. https:\/\/doi.org\/10.12785\/amis\/070414","journal-title":"Inf Sci"},{"key":"11927_CR43","doi-asserted-by":"crossref","unstructured":"Syverson P, Cervesato I (2001) The logic of authentication Protocols. Pp 63\u2013137","DOI":"10.1007\/3-540-45608-2_2"},{"key":"11927_CR44","first-page":"1","volume":"1","author":"Team A","year":"2006","unstructured":"Team A (2006) AVISPA v1. 1 user manual. Inf Soc Technol 1:1\u201388","journal-title":"Inf Soc Technol"},{"key":"11927_CR45","unstructured":"Team A (2006) HLPSL Tutorial, A Beginner\u2019s Guide to Modelling and Analysing Internet Security Protocols Inf Technol Solut 1\u201352"},{"key":"11927_CR46","doi-asserted-by":"publisher","first-page":"805","DOI":"10.1109\/JSYST.2014.2322973","volume":"9","author":"JL Tsai","year":"2015","unstructured":"Tsai JL, Lo NW (2015) A privacy-aware authentication scheme for distributed Mobile cloud computing services. IEEE Syst J 9:805\u2013815. https:\/\/doi.org\/10.1109\/JSYST.2014.2322973","journal-title":"IEEE Syst J"},{"key":"11927_CR47","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1002\/sec","volume":"5","author":"M Wazid","year":"2016","unstructured":"Wazid M, Das AK, Kumari S, Li X, Wu F (2016) Provably secure biometric-based user authentication and key agreement scheme in cloud computing. Secur Commun Networks 5:422\u2013437. https:\/\/doi.org\/10.1002\/sec","journal-title":"Secur Commun Networks"},{"key":"11927_CR48","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1016\/j.sysarc.2018.12.005","volume":"97","author":"M Wazid","year":"2019","unstructured":"Wazid M, Das AK, Hussain R, Succi G, Rodrigues JJPC (2019) Authentication in cloud-driven IoT-based big data environment: survey and outlook. J Syst Archit 97:185\u2013196. https:\/\/doi.org\/10.1016\/j.sysarc.2018.12.005","journal-title":"J Syst Archit"},{"key":"11927_CR49","doi-asserted-by":"publisher","first-page":"102496","DOI":"10.1016\/j.jnca.2019.102496","volume":"150","author":"M Wazid","year":"2020","unstructured":"Wazid M, Das AK, Bhat KV, Vasilakos AV (2020) LAM-CIoT: lightweight authentication mechanism in cloud-based IoT environment. J Netw Comput Appl 150:102496. https:\/\/doi.org\/10.1016\/j.jnca.2019.102496","journal-title":"J Netw Comput Appl"},{"key":"11927_CR50","unstructured":"Wessels J (2001) Applications of Ban-Logic"},{"key":"11927_CR51","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MCE.2018.2851744","volume":"7","author":"F Wu","year":"2018","unstructured":"Wu F, Li X, Xu L, Sangaiah AK, Rodrigues JJPC (2018) Authentication protocol for distributed cloud computing: an explanation of the security situations for Internet-of-things-enabled devices. IEEE Consum Electron Mag 7:38\u201344. https:\/\/doi.org\/10.1109\/MCE.2018.2851744","journal-title":"IEEE Consum Electron Mag"},{"key":"11927_CR52","doi-asserted-by":"publisher","first-page":"28096","DOI":"10.1109\/ACCESS.2020.2969986","volume":"8","author":"T-Y Wu","year":"2020","unstructured":"Wu T-Y, Lee Z, Obaidat MS, Kumari S, Kumar S, Chen CM (2020) An authenticated key exchange protocol for multi-server architecture in 5G networks. IEEE Access 8:28096\u201328108. https:\/\/doi.org\/10.1109\/ACCESS.2020.2969986","journal-title":"IEEE Access"},{"key":"11927_CR53","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1016\/j.jcss.2013.07.004","volume":"80","author":"K Xue","year":"2014","unstructured":"Xue K, Hong P, Ma C (2014) Journal of computer and system sciences a lightweight dynamic pseudonym identity based authentication and key agreement protocol without verification tables for multi-server architecture. J Comput Syst Sci 80:195\u2013206. https:\/\/doi.org\/10.1016\/j.jcss.2013.07.004","journal-title":"J Comput Syst Sci"},{"key":"11927_CR54","unstructured":"Yang S, Greenberg A, Endsley M (2011) Social computing, Behavioral-Cultural Modeling and Prediction. Springer Berlin Heidelberg, Berlin, Heidelberg"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-11927-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-022-11927-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-11927-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T08:29:33Z","timestamp":1651048173000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-022-11927-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,24]]},"references-count":54,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2022,4]]}},"alternative-id":["11927"],"URL":"https:\/\/doi.org\/10.1007\/s11042-022-11927-y","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,2,24]]},"assertion":[{"value":"14 July 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 December 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 January 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 February 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}