{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T17:06:12Z","timestamp":1761930372486,"version":"3.37.3"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","license":[{"start":{"date-parts":[[2024,5,7]],"date-time":"2024-05-07T00:00:00Z","timestamp":1715040000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,5,7]],"date-time":"2024-05-07T00:00:00Z","timestamp":1715040000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-024-19330-5","type":"journal-article","created":{"date-parts":[[2024,5,7]],"date-time":"2024-05-07T03:47:16Z","timestamp":1715053636000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["An efficient secure channel establishment through lightweight key distribution in e-health communication systems"],"prefix":"10.1007","author":[{"given":"Iman","family":"Ebrahimi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3894-3103","authenticated-orcid":false,"given":"Morteza","family":"Nikooghadam","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,5,7]]},"reference":[{"key":"19330_CR1","doi-asserted-by":"publisher","unstructured":"Nanda SK, Panda SK, Dash M (2023) Medical supply chain integrated with blockchain and IoT to track the logistics of medical products. Multimed Tools Appl 1\u201323. https:\/\/doi.org\/10.1007\/s11042-023-14846-8","DOI":"10.1007\/s11042-023-14846-8"},{"key":"19330_CR2","doi-asserted-by":"publisher","unstructured":"Verma P, Gupta DS (2023) A pairing-free data authentication and aggregation mechanism for Intelligent Healthcare System. Comput Commun 198: 282\u2013296. https:\/\/doi.org\/10.1016\/j.comcom.2022.12.009","DOI":"10.1016\/j.comcom.2022.12.009"},{"key":"19330_CR3","doi-asserted-by":"publisher","unstructured":"Ghoul Y, Naifar O (2023) IoT based applications for healthcare and home automation. Multimed Tools Appl 1\u201323. https:\/\/doi.org\/10.1007\/s11042-023-16774-z","DOI":"10.1007\/s11042-023-16774-z"},{"key":"19330_CR4","doi-asserted-by":"publisher","first-page":"2585","DOI":"10.1007\/s00500-019-03857-z","volume":"23","author":"E Shanmugapriya","year":"2019","unstructured":"Shanmugapriya E, Kavitha R (2019) Medical big data analysis: preserving security and privacy with hybrid cloud technology. Soft Comput 23:2585\u20132596. https:\/\/doi.org\/10.1007\/s00500-019-03857-z","journal-title":"Soft Comput"},{"key":"19330_CR5","doi-asserted-by":"publisher","unstructured":"Adeniyi AE, Abiodun KM, Awotunde JB, Olagunju M, Ojo OS, Edet NP (2023) Implementation of a block cipher algorithm for medical information security on cloud environment: using modified advanced encryption standard approach. Multimed Tools Appl 1\u201315. https:\/\/doi.org\/10.1007\/s11042-023-14338-9","DOI":"10.1007\/s11042-023-14338-9"},{"key":"19330_CR6","doi-asserted-by":"publisher","unstructured":"Singh C, Jaya E, Jagatheeswari A (2023) Secured blind digital certificate and Lamport Merkle cloud assisted medical image sharing using blockchain. Multimed Tools Appl 82 (6): 9323\u20139342. https:\/\/doi.org\/10.1007\/s11042-022-13719-w","DOI":"10.1007\/s11042-022-13719-w"},{"key":"19330_CR7","doi-asserted-by":"publisher","first-page":"8239","DOI":"10.1007\/s13369-018-3494-6","volume":"43","author":"BA Alzahrani","year":"2018","unstructured":"Alzahrani BA, Irshad A (2018) A secure and efficient TMIS-based authentication scheme improved against Zhang et al\u2019.s scheme. Arab J Sci Eng 43:8239\u20138253. https:\/\/doi.org\/10.1007\/s13369-018-3494-6","journal-title":"Arab J Sci Eng"},{"key":"19330_CR8","doi-asserted-by":"publisher","unstructured":"Xiao W, Tang Y, Liu J, Wu D, Alzahrani B, Hao Y, Zhou N (2022) Semantic-driven Efficient Service Network towards Smart Healthcare System in Intelligent Fabric. IEEE Trans Netw Sci Eng. https:\/\/doi.org\/10.1109\/TNSE.2022.3202901","DOI":"10.1109\/TNSE.2022.3202901"},{"key":"19330_CR9","doi-asserted-by":"publisher","first-page":"190855","DOI":"10.1109\/ACCESS.2020.3031484","volume":"8","author":"BA Alzahrani","year":"2020","unstructured":"Alzahrani BA, Irshad A, Albeshri A, Alsubhi K, Shafiq M (2020) An improved lightweight authentication protocol for wireless body area networks. IEEE Access 8:190855\u2013190872. https:\/\/doi.org\/10.1109\/ACCESS.2020.3031484","journal-title":"IEEE Access"},{"key":"19330_CR10","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1016\/j.future.2021.05.019","volume":"124","author":"A Barnawi","year":"2021","unstructured":"Barnawi A, Chhikara P, Tekchandani R, Kumar N, Alzahrani B (2021) Artificial intelligence-enabled Internet of Things-based system for COVID-19 screening using aerial thermal imaging. Futur Gener Comput Syst 124:119\u2013132. https:\/\/doi.org\/10.1016\/j.future.2021.05.019","journal-title":"Futur Gener Comput Syst"},{"issue":"11","key":"19330_CR11","doi-asserted-by":"publisher","first-page":"e4423","DOI":"10.1002\/dac.4423","volume":"33","author":"BA Alzahrani","year":"2020","unstructured":"Alzahrani BA, Irshad A, Alsubhi K, Albeshri A (2020) A secure and efficient remote patient-monitoring authentication protocol for cloud-IoT. Int J Commun Syst 33(11):e4423. https:\/\/doi.org\/10.1002\/dac.4423","journal-title":"Int J Commun Syst"},{"key":"19330_CR12","doi-asserted-by":"publisher","unstructured":"Chaudhry SA, Naqvi H, Khan MK (2018) An enhanced lightweight anonymous biometric based authentication scheme for TMIS. Multimed Tools Appl 77: 5503\u20135524. https:\/\/doi.org\/10.1007\/s11042-017-4464-9","DOI":"10.1007\/s11042-017-4464-9"},{"key":"19330_CR13","doi-asserted-by":"publisher","unstructured":"Irshad A, Sher M, Chaudhry SA, Kumari S, Sangaiah AK, Li X, Wu F (2018) A secure mutual authenticated key agreement of user with multiple servers for critical systems. Multimed Tools Appl 77: 11067\u201311099. https:\/\/doi.org\/10.1007\/s11042-017-5078-y","DOI":"10.1007\/s11042-017-5078-y"},{"key":"19330_CR14","doi-asserted-by":"publisher","unstructured":"Nayak CS (2020) An improved user authentication scheme for electronic medical record systems. Multimed Tools Appl 79: 22007\u201322026. https:\/\/doi.org\/10.1007\/s11042-020-08983-7","DOI":"10.1007\/s11042-020-08983-7"},{"issue":"3","key":"19330_CR15","doi-asserted-by":"publisher","first-page":"1385","DOI":"10.1007\/s11276-022-03196-2","volume":"29","author":"HS Trivedi","year":"2023","unstructured":"Trivedi HS, Patel SJ (2023) Dynamically scalable privacy-preserving authentication protocol for distributed IoT based healthcare service providers. Wireless Netw 29(3):1385\u20131409. https:\/\/doi.org\/10.1007\/s11276-022-03196-2","journal-title":"Wireless Netw"},{"key":"19330_CR16","doi-asserted-by":"publisher","unstructured":"Saha S, Chowdhury C, Neogy S (2023) A novel two phase data sensitivity based access control framework for healthcare data. Multimed Tools Appl 1\u201326. https:\/\/doi.org\/10.1007\/s11042-023-15427-5","DOI":"10.1007\/s11042-023-15427-5"},{"key":"19330_CR17","doi-asserted-by":"publisher","unstructured":"ElRahman SA, Alluhaidan AS (2021) Blockchain technology and IoT-edge framework for sharing healthcare services. Soft Comput 25(21): 13753\u201313777. https:\/\/doi.org\/10.1007\/s00500-021-06041-4","DOI":"10.1007\/s00500-021-06041-4"},{"issue":"11","key":"19330_CR18","doi-asserted-by":"publisher","first-page":"16009","DOI":"10.1007\/s11042-022-14007-3","volume":"82","author":"Y Chen","year":"2023","unstructured":"Chen Y, Chen J (2023) A biometrics-based mutual authentication and key agreement protocol for TMIS using elliptic curve cryptography. Multimed Tools Appl 82(11):16009\u201316032. https:\/\/doi.org\/10.1007\/s11042-022-14007-3","journal-title":"Multimed Tools Appl"},{"key":"19330_CR19","doi-asserted-by":"publisher","unstructured":"Madhusudhan R, Nayak CS (2019) A robust authentication scheme for telecare medical information systems. Multimed Tools Appl 78, 15255\u201315273. https:\/\/doi.org\/10.1007\/s11042-018-6884-6","DOI":"10.1007\/s11042-018-6884-6"},{"key":"19330_CR20","doi-asserted-by":"publisher","unstructured":"Deebak BD, Al-Turjman F, Nayyar A (2021) Chaotic-map based authenticated security framework with privacy preservation for remote point-of-care. Multimed Tools Appl 80, 17103\u201317128. https:\/\/doi.org\/10.1007\/s11042-020-10134-x","DOI":"10.1007\/s11042-020-10134-x"},{"key":"19330_CR21","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/s11277-020-07237-x","volume":"117","author":"BA Alzahrani","year":"2021","unstructured":"Alzahrani BA, Irshad A, Albeshri A, Alsubhi K (2021) A provably secure and lightweight patient-healthcare authentication protocol in wireless body area networks. Wireless Pers Commun 117:47\u201369. https:\/\/doi.org\/10.1007\/s11277-020-07237-x","journal-title":"Wireless Pers Commun"},{"key":"19330_CR22","doi-asserted-by":"publisher","first-page":"103259","DOI":"10.1016\/j.jisa.2022.103259","volume":"68","author":"A Gupta","year":"2022","unstructured":"Gupta A, Tripathi M, Muhuri S, Singal G, Kumar N (2022) A secure and lightweight anonymous mutual authentication scheme for wearable devices in Medical Internet of Things. J Inform Secur Appl 68:103259. https:\/\/doi.org\/10.1016\/j.jisa.2022.103259","journal-title":"J Inform Secur Appl"},{"key":"19330_CR23","doi-asserted-by":"publisher","unstructured":"Kumar A, Singh K, Shariq M, Lal C, Conti M, Amin R, Chaudhry SA (2023) An efficient and reliable ultralightweight RFID authentication scheme for healthcare systems. Comput Commun 205: 147\u2013157. https:\/\/doi.org\/10.1016\/j.comcom.2023.04.013","DOI":"10.1016\/j.comcom.2023.04.013"},{"key":"19330_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2021\/6658041","volume":"2021","author":"T-Y Wu","year":"2021","unstructured":"Wu T-Y, Wang T, Lee Y-Q, Zheng W, Kumari S, Kumar S (2021) Improved authenticated key agreement scheme for fog-driven IoT healthcare system. Secur Commun Netw 2021:1\u201316. https:\/\/doi.org\/10.1155\/2021\/6658041","journal-title":"Secur Commun Netw"},{"key":"19330_CR25","doi-asserted-by":"publisher","unstructured":"Rajasekaran AS, Azees M, Dash CS, Nayyar A (2023) Content addressable memory (CAM) based robust anonymous authentication and integrity preservation scheme for wireless body area networks (WBAN). Multimed Tools Appl 1\u201327. https:\/\/doi.org\/10.1007\/s11042-023-16257-1","DOI":"10.1007\/s11042-023-16257-1"},{"key":"19330_CR26","doi-asserted-by":"publisher","unstructured":"Mahajan HB, Junnarkar AA (2023) Smart healthcare system using integrated and lightweight ECC with private blockchain for multimedia medical data processing. Multimed Tools Appl 1\u201324. https:\/\/doi.org\/10.1007\/s11042-023-15204-4","DOI":"10.1007\/s11042-023-15204-4"},{"key":"19330_CR27","doi-asserted-by":"publisher","unstructured":"Singh N, Das AK (2023) TFAS: two factor authentication scheme for blockchain enabled IoMT using PUF and fuzzy extractor. J Supercomput 1\u201350. https:\/\/doi.org\/10.1007\/s11227-023-05507-6","DOI":"10.1007\/s11227-023-05507-6"},{"issue":"30","key":"19330_CR28","doi-asserted-by":"publisher","first-page":"43551","DOI":"10.1007\/s11042-022-13106-5","volume":"81","author":"K Chatterjee","year":"2022","unstructured":"Chatterjee K, Chaudhary RRK, Singh A (2022) A lightweight block cipher technique for IoT based E-healthcare system security. Multimed Tools Appl 81(30):43551\u201343580. https:\/\/doi.org\/10.1007\/s11042-022-13106-5","journal-title":"Multimed Tools Appl"},{"key":"19330_CR29","doi-asserted-by":"publisher","unstructured":"Kandar S, Pal S, Dhara BC (2021) A biometric based remote user authentication technique using smart card in multi-server environment. Wireless Personal Commun 120, (2): 1003\u20131026. https:\/\/doi.org\/10.1007\/s11277-021-08501-4","DOI":"10.1007\/s11277-021-08501-4"},{"key":"19330_CR30","doi-asserted-by":"publisher","first-page":"31649","DOI":"10.1007\/s11042-019-07949-8","volume":"78","author":"T-F Lee","year":"2019","unstructured":"Lee T-F, Diao Y-Y, Hsieh Y-P (2019) A ticket-based multi-server biometric authentication scheme using extended chaotic maps for telecare medical information systems. Multimed Tools Appl 78:31649\u201331672. https:\/\/doi.org\/10.1007\/s11042-019-07949-8","journal-title":"Multimed Tools Appl"},{"issue":"11","key":"19330_CR31","doi-asserted-by":"publisher","first-page":"16279","DOI":"10.1007\/s11042-022-14023-3","volume":"82","author":"W-X Yuan","year":"2023","unstructured":"Yuan W-X, Yan B, Li W, Hao L-Y, Yang H-M (2023) Blockchain-based medical health record access control scheme with efficient protection mechanism and patient control. Multimed Tools Appl 82(11):16279\u201316300. https:\/\/doi.org\/10.1007\/s11042-022-14023-3","journal-title":"Multimed Tools Appl"},{"key":"19330_CR32","doi-asserted-by":"publisher","unstructured":"Maurya C, Chaurasiya VK (2023) Collusion-resistant and privacy-preserving data sharing scheme on outsourced data in e-healthcare system. Multimed Tools Appl 1\u201330. https:\/\/doi.org\/10.1007\/s11042-023-15006-8","DOI":"10.1007\/s11042-023-15006-8"},{"key":"19330_CR33","doi-asserted-by":"publisher","unstructured":"Amintoosi H, Nikooghadam M, Kumari S, Jun F, Xiong H, Kumar S, Rodrigues JJPC (2021) Secure and authenticated data access and sharing model for smart wearable systems. IEEE Internet Things J 9(7):5368\u20135379. https:\/\/doi.org\/10.1109\/JIOT.2021.3109274","DOI":"10.1109\/JIOT.2021.3109274"},{"issue":"4","key":"19330_CR34","doi-asserted-by":"publisher","first-page":"3017","DOI":"10.1007\/s13369-020-04905-9","volume":"46","author":"BA Alzahrani","year":"2021","unstructured":"Alzahrani BA (2021) Secure and efficient cloud-based IoT authenticated key agreement scheme for e-health wireless sensor networks. Arab J Sci Eng 46(4):3017\u20133032. https:\/\/doi.org\/10.1007\/s13369-020-04905-9","journal-title":"Arab J Sci Eng"},{"key":"19330_CR35","doi-asserted-by":"publisher","unstructured":"Karthigaiveni M, Indrani B (2019) An efficient two-factor authentication scheme with key agreement for IoT based E-health care application using smart card. J Ambient Intell Human Comput 1\u201312. https:\/\/doi.org\/10.1007\/s12652-019-01513-w","DOI":"10.1007\/s12652-019-01513-w"},{"key":"19330_CR36","doi-asserted-by":"publisher","unstructured":"Singh S, Chaurasiya VK (2022) Mutual authentication framework using fog computing in healthcare. Multimed Tools Appl 81(22): 31977\u201332003. https:\/\/doi.org\/10.1007\/s11042-022-12131-8","DOI":"10.1007\/s11042-022-12131-8"},{"key":"19330_CR37","doi-asserted-by":"publisher","unstructured":"Amin R, Hafizul Islam SK, Biswas GP, Khan MK, Kumar N (2015) An efficient and practical smart card based anonymity preserving user authentication scheme for TMIS using elliptic curve cryptography. J Med Syst 39: 1\u201318. https:\/\/doi.org\/10.1007\/s10916-015-0351-y","DOI":"10.1007\/s10916-015-0351-y"},{"key":"19330_CR38","doi-asserted-by":"publisher","first-page":"9994","DOI":"10.1007\/s10916-013-9994-8","volume":"38","author":"X Xu","year":"2014","unstructured":"Xu X, Zhu P, Wen Q et al (2014) A secure and efficient authentication and key agreement scheme based on ecc for telecare medicine information systems. J Med Syst 38:9994. https:\/\/doi.org\/10.1007\/s10916-013-9994-8","journal-title":"J Med Syst"},{"key":"19330_CR39","doi-asserted-by":"publisher","unstructured":"Amin R, Biswas GP (2015) A secure three-factor user authentication and key agreement protocol for tmis with user anonymity. J Med Syst 39(8):78. https:\/\/doi.org\/10.1007\/s10916-015-0258-7","DOI":"10.1007\/s10916-015-0258-7"},{"key":"19330_CR40","doi-asserted-by":"publisher","first-page":"2605","DOI":"10.1007\/s11277-019-07005-6","volume":"111","author":"K Chatterjee","year":"2020","unstructured":"Chatterjee K (2020) An improved authentication protocol for wireless body sensor networks applied in healthcare applications. Wireless Pers Commun 111:2605\u20132623. https:\/\/doi.org\/10.1007\/s11277-019-07005-6","journal-title":"Wireless Pers Commun"},{"key":"19330_CR41","doi-asserted-by":"publisher","unstructured":"Ramalingam P, Pabitha P (2023) ASK-RAM-IMOT: Autonomous Shared Keys based Remote Authentication Method for Internet of Medical Things Applications. Wireless Personal Communications 1\u201321. https:\/\/doi.org\/10.1007\/s11277-023-10428-x","DOI":"10.1007\/s11277-023-10428-x"},{"key":"19330_CR42","doi-asserted-by":"publisher","unstructured":"Von Ahn L, Blum M, Langford J (2004) Telling humans and computers apart automatically. Communications of the ACM 47(2): 56\u201360. https:\/\/doi.org\/10.1145\/966389.966390","DOI":"10.1145\/966389.966390"},{"key":"19330_CR43","doi-asserted-by":"publisher","unstructured":"Singh AK, Nayyar A, Garg A (2023) A secure elliptic curve based anonymous authentication and key establishment mechanism for IoT and cloud. Multimed Tools Appl 82(15): 22525\u201322576. https:\/\/doi.org\/10.1007\/s11042-022-14140-z","DOI":"10.1007\/s11042-022-14140-z"},{"issue":"3","key":"19330_CR44","doi-asserted-by":"publisher","first-page":"1421","DOI":"10.1007\/s11276-022-03205-4","volume":"29","author":"S Mandal","year":"2023","unstructured":"Mandal S (2023) Provably secure certificateless protocol for wireless body area network. Wireless Netw 29(3):1421\u20131438. https:\/\/doi.org\/10.1007\/s11276-022-03205-4","journal-title":"Wireless Netw"},{"key":"19330_CR45","doi-asserted-by":"publisher","unstructured":"Yao H, Yan Q, Fu X, Zhang Z, Lan C (2022) ECC-based lightweight authentication and access control scheme for IoT E-healthcare. Soft Computing 1\u201321. https:\/\/doi.org\/10.1007\/s00500-021-06512-8","DOI":"10.1007\/s00500-021-06512-8"},{"issue":"3","key":"19330_CR46","doi-asserted-by":"publisher","first-page":"1328","DOI":"10.1109\/TR.2018.2850966","volume":"67","author":"D Abbasinezhad-Mood","year":"2018","unstructured":"Abbasinezhad-Mood D, Nikooghadam M (2018) Efficient design of a novel ECC-based public key scheme for medical data protection by utilization of NanoPi fire. IEEE Trans Reliab 67(3):1328\u20131339. https:\/\/doi.org\/10.1109\/TR.2018.2850966","journal-title":"IEEE Trans Reliab"},{"issue":"7","key":"19330_CR47","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1145\/129902.129905","volume":"35","author":"RL Rivest","year":"1992","unstructured":"Rivest RL, Hellman ME, Anderson JC, Lyons JW (1992) Responses to NIST\u2019s proposal. Commun ACM 35(7):41\u201354","journal-title":"Commun ACM"},{"key":"19330_CR48","unstructured":"National Institute of Standards, and Technology (US). (1993) Technology Administration. Secure hash standard. Vol. 180, no. 1. US Department of Commerce, Technology Administration, National Institute of Standards and Technology"},{"key":"19330_CR49","doi-asserted-by":"publisher","first-page":"103094","DOI":"10.1016\/j.adhoc.2023.103094","volume":"141","author":"M Abdussami","year":"2023","unstructured":"Abdussami M, Amin R, Vollala S (2023) Provably secured lightweight authenticated key agreement protocol for modern health industry. Ad Hoc Netw 141:103094. https:\/\/doi.org\/10.1016\/j.adhoc.2023.103094","journal-title":"Ad Hoc Netw"},{"key":"19330_CR50","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-015-0221-7","volume":"39","author":"Y Lu","year":"2015","unstructured":"Lu Y, Li L, Peng H, Yang Y (2015) An enhanced biometric-based authentication scheme for telecare medicine information systems using elliptic curve cryptosystem. J Med Syst 39:1\u20138. https:\/\/doi.org\/10.1007\/s10916-015-0221-7","journal-title":"J Med Syst"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-19330-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-024-19330-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-19330-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,7]],"date-time":"2024-05-07T03:49:43Z","timestamp":1715053783000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-024-19330-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,7]]},"references-count":50,"alternative-id":["19330"],"URL":"https:\/\/doi.org\/10.1007\/s11042-024-19330-5","relation":{},"ISSN":["1573-7721"],"issn-type":[{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2024,5,7]]},"assertion":[{"value":"30 September 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 April 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 April 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 May 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"There are no known conflicts of interest associated with this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interests"}},{"value":"These article does not includes any study of human participants or animals performed by the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"All the authors have agreed to participate in this submitted article.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}}]}}