{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,23]],"date-time":"2025-09-23T13:10:36Z","timestamp":1758633036120},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2016,3,15]],"date-time":"2016-03-15T00:00:00Z","timestamp":1458000000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2016,6]]},"DOI":"10.1007\/s11128-016-1289-9","type":"journal-article","created":{"date-parts":[[2016,3,18]],"date-time":"2016-03-18T19:18:26Z","timestamp":1458328706000},"page":"2499-2519","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Improvement of a quantum broadcasting multiple blind signature scheme based on quantum teleportation"],"prefix":"10.1007","volume":"15","author":[{"given":"Wei","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Daowen","family":"Qiu","sequence":"additional","affiliation":[]},{"given":"Xiangfu","family":"Zou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,15]]},"reference":[{"issue":"5","key":"1289_CR1","doi-asserted-by":"crossref","first-page":"1484","DOI":"10.1137\/S0097539795293172","volume":"26","author":"P Shor","year":"1997","unstructured":"Shor, P.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26(5), 1484\u20131509 (1997)","journal-title":"SIAM J. Comput."},{"issue":"4","key":"1289_CR2","doi-asserted-by":"crossref","first-page":"042312","DOI":"10.1103\/PhysRevA.65.042312","volume":"65","author":"GH Zeng","year":"2002","unstructured":"Zeng, G.H., Keitel, C.H.: Arbitrated quantum-signature scheme. Phys. Rev. A 65(4), 042312 (2002)","journal-title":"Phys. Rev. A"},{"issue":"5","key":"1289_CR3","doi-asserted-by":"crossref","first-page":"054307","DOI":"10.1103\/PhysRevA.79.054307","volume":"79","author":"Q Li","year":"2009","unstructured":"Li, Q., Chan, W.H., Long, D.Y.: Arbitrated quantum signature scheme using Bell states. Phys. Rev. A 79(5), 054307 (2009)","journal-title":"Phys. Rev. A"},{"issue":"4","key":"1289_CR4","doi-asserted-by":"crossref","first-page":"042325","DOI":"10.1103\/PhysRevA.82.042325","volume":"82","author":"XF Zou","year":"2010","unstructured":"Zou, X.F., Qiu, D.W.: Security analysis and improvements of arbitrated quantum signature schemes. Phys. Rev. A 82(4), 042325 (2010)","journal-title":"Phys. Rev. A"},{"issue":"7","key":"1289_CR5","doi-asserted-by":"crossref","first-page":"2427","DOI":"10.1007\/s11128-013-0538-4","volume":"12","author":"Q Li","year":"2013","unstructured":"Li, Q., Li, C., Long, D.Y., et al.: Efficient arbitrated quantum signature and its proof of security. Quantum Inf. Process. 12(7), 2427\u20132439 (2013)","journal-title":"Quantum Inf. Process."},{"issue":"1","key":"1289_CR6","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1007\/s11128-013-0634-5","volume":"13","author":"YP Luo","year":"2014","unstructured":"Luo, Y.P., Hwang, T.: Arbitrated quantum signature of classical messages without using authenticated classical channels. Quantum Inf. Process. 13(1), 113\u2013120 (2014)","journal-title":"Quantum Inf. Process."},{"issue":"11","key":"1289_CR7","doi-asserted-by":"crossref","first-page":"2079","DOI":"10.1007\/s11433-014-5491-4","volume":"57","author":"CH Yu","year":"2014","unstructured":"Yu, C.H., Guo, D., Lin, S.: Arbitrated quantum signature scheme based on reusable key. Sci. China Phys. Mech. Astron. 57(11), 2079\u20132085 (2014)","journal-title":"Sci. China Phys. Mech. Astron."},{"key":"1289_CR8","doi-asserted-by":"crossref","first-page":"1250041","DOI":"10.1142\/S0219749912500414","volume":"10","author":"XR Yin","year":"2012","unstructured":"Yin, X.R., Ma, W.P., Liu, W.Y.: Quantum proxy group signature scheme with-type entangled states. Int. J. Quantum Inf. 10, 1250041 (2012)","journal-title":"Int. J. Quantum Inf."},{"issue":"2","key":"1289_CR9","doi-asserted-by":"crossref","first-page":"455","DOI":"10.1007\/s11128-011-0258-6","volume":"11","author":"TY Wang","year":"2012","unstructured":"Wang, T.Y., Wei, Z.L.: One-time proxy signature based on quantum cryptography. Quantum Inf. Process. 11(2), 455\u2013463 (2012)","journal-title":"Quantum Inf. Process."},{"issue":"1","key":"1289_CR10","doi-asserted-by":"crossref","first-page":"549","DOI":"10.1007\/s11128-012-0398-3","volume":"12","author":"X Wen","year":"2013","unstructured":"Wen, X., Chen, Y., Fang, J.: An inter-bank E-payment protocol based on quantum proxy blind signature. Quantum Inf. Process. 12(1), 549\u2013558 (2013)","journal-title":"Quantum Inf. Process."},{"issue":"9","key":"1289_CR11","doi-asserted-by":"crossref","first-page":"3095","DOI":"10.1007\/s10773-014-2105-x","volume":"53","author":"HJ Cao","year":"2014","unstructured":"Cao, H.J., Huang, J., Yu, Y.F., et al.: A quantum proxy signature scheme based on genuine five-qubit entangled state. Int. J. Theor. Phys. 53(9), 3095\u20133100 (2014)","journal-title":"Int. J. Theor. Phys."},{"issue":"5","key":"1289_CR12","doi-asserted-by":"crossref","first-page":"055001","DOI":"10.1088\/0031-8949\/81\/05\/055001","volume":"81","author":"X Wen","year":"2010","unstructured":"Wen, X., Tian, Y., Ji, L., et al.: A group signature scheme based on quantum teleportation. Phys. Scr. 81(5), 055001 (2010)","journal-title":"Phys. Scr."},{"issue":"6","key":"1289_CR13","doi-asserted-by":"crossref","first-page":"065403","DOI":"10.1088\/0031-8949\/82\/06\/065403","volume":"82","author":"X Wen","year":"2010","unstructured":"Wen, X.: An E-payment system based on quantum group signature. Phys. Scr. 82(6), 065403 (2010)","journal-title":"Phys. Scr."},{"issue":"14","key":"1289_CR14","doi-asserted-by":"crossref","first-page":"3654","DOI":"10.1016\/j.optcom.2011.03.083","volume":"284","author":"R Xu","year":"2011","unstructured":"Xu, R., Huang, L., Yang, W., et al.: Quantum group blind signature scheme without entanglement. Opt. Commun. 284(14), 3654\u20133658 (2011)","journal-title":"Opt. Commun."},{"issue":"4","key":"1289_CR15","doi-asserted-by":"crossref","first-page":"045012","DOI":"10.1088\/0031-8949\/87\/04\/045012","volume":"87","author":"K Zhang","year":"2013","unstructured":"Zhang, K., Song, T., Zuo, H., et al.: A secure quantum group signature scheme based on Bell states. Phys. Scr. 87(4), 045012 (2013)","journal-title":"Phys. Scr."},{"issue":"21","key":"1289_CR16","doi-asserted-by":"crossref","first-page":"4408","DOI":"10.1016\/j.optcom.2010.06.061","volume":"283","author":"S Qi","year":"2010","unstructured":"Qi, S., Zheng, H., Wen, Q., et al.: Quantum blind signature based on two-state vector formalism. Opt. Commun. 283(21), 4408\u20134410 (2010)","journal-title":"Opt. Commun."},{"issue":"2","key":"1289_CR17","doi-asserted-by":"crossref","first-page":"455","DOI":"10.1007\/s10773-011-0922-8","volume":"51","author":"XR Yin","year":"2012","unstructured":"Yin, X.R., Ma, W.P., Liu, W.Y.: A blind quantum signature scheme with-type entangled states. Int. J. Theor. Phys. 51(2), 455\u2013461 (2012)","journal-title":"Int. J. Theor. Phys."},{"key":"1289_CR18","doi-asserted-by":"crossref","unstructured":"Lin, T.S., Chen, Y., Chang, T.H., et al.: Quantum blind signature based on quantum circuit. Nanotechnology (IEEE-NANO). In: 2014 IEEE 14th International Conference on. IEEE, pp. 868\u2013872 (2014)","DOI":"10.1109\/NANO.2014.6968020"},{"issue":"3\/4","key":"1289_CR19","first-page":"147","volume":"62","author":"XJ Wen","year":"2007","unstructured":"Wen, X.J., Liu, Y., Sun, Y.: Quantum multi-signature protocol based on teleportation. Z. Nat. A 62(3\/4), 147 (2007)","journal-title":"Z. Nat. A"},{"issue":"6","key":"1289_CR20","first-page":"1079","volume":"35","author":"X Wen","year":"2007","unstructured":"Wen, X., Liu, Y.: A realizable quantum sequential multi-signature scheme. Dianzi Xuebao (Acta Electron. Sin.) 35(6), 1079\u20131083 (2007)","journal-title":"Dianzi Xuebao (Acta Electron. Sin.)"},{"issue":"2","key":"1289_CR21","doi-asserted-by":"crossref","first-page":"022344","DOI":"10.1103\/PhysRevA.84.022344","volume":"84","author":"F Gao","year":"2011","unstructured":"Gao, F., Qin, S.J., Guo, F.Z., et al.: Cryptanalysis of the arbitrated quantum signature protocols. Phys. Rev. A. 84(2), 022344 (2011)","journal-title":"Phys. Rev. A."},{"issue":"6","key":"1289_CR22","doi-asserted-by":"crossref","first-page":"062330","DOI":"10.1103\/PhysRevA.84.062330","volume":"84","author":"JW Choi","year":"2011","unstructured":"Choi, J.W., Chang, K.Y., Hong, D.: Security problem on arbitrated quantum signature schemes. Phys. Rev. A 84(6), 062330 (2011)","journal-title":"Phys. Rev. A"},{"issue":"7","key":"1289_CR23","doi-asserted-by":"crossref","first-page":"2343","DOI":"10.1007\/s11128-013-0524-x","volume":"12","author":"H Zuo","year":"2013","unstructured":"Zuo, H., Zhang, K., Song, T.: Security analysis of quantum multi-signature protocol based on teleportation. Quantum Inf. Process. 12(7), 2343\u20132353 (2013)","journal-title":"Quantum Inf. Process."},{"issue":"1","key":"1289_CR24","doi-asserted-by":"crossref","first-page":"015102","DOI":"10.1088\/0031-8949\/89\/01\/015102","volume":"89","author":"Z Kejia","year":"2014","unstructured":"Kejia, Z., Dan, L., Qi, S.: Security of the arbitrated quantum signature protocols revisited. Phys. Scr. 89(1), 015102 (2014)","journal-title":"Phys. Scr."},{"issue":"9","key":"1289_CR25","doi-asserted-by":"crossref","first-page":"2007","DOI":"10.1007\/s11128-014-0795-x","volume":"13","author":"CW Yang","year":"2014","unstructured":"Yang, C.W., Luo, Y.P., Hwang, T.: Forgery attack on one-time proxy signature and the improvement. Quantum Inf. Process. 13(9), 2007\u20132016 (2014)","journal-title":"Quantum Inf. Process."},{"issue":"6","key":"1289_CR26","doi-asserted-by":"crossref","first-page":"1345","DOI":"10.1007\/s11128-014-0732-z","volume":"13","author":"ZH Liu","year":"2014","unstructured":"Liu, Z.H., Chen, H.W., Wang, D., et al.: Cryptanalysis and improvement of three-particle deterministic secure and high bit-rate direct quantum communication protocol. Quantum Inf. Process. 13(6), 1345\u20131351 (2014)","journal-title":"Quantum Inf. Process."},{"issue":"8","key":"1289_CR27","doi-asserted-by":"crossref","first-page":"1677","DOI":"10.1007\/s11128-014-0760-8","volume":"13","author":"TY Wang","year":"2014","unstructured":"Wang, T.Y., Cai, X.Q., Zhang, R.L.: Security of a sessional blind signature based on quantum cryptograph. Quantum Inf. Process. 13(8), 1677\u20131685 (2014)","journal-title":"Quantum Inf. Process."},{"issue":"1","key":"1289_CR28","first-page":"41","volume":"5","author":"H Lo","year":"2005","unstructured":"Lo, H., Ko, T.: Some attacks on quantum-based cryptographic protocols. Quantum Inf. Comput. 5(1), 41\u201348 (2005)","journal-title":"Quantum Inf. Comput."},{"key":"1289_CR29","doi-asserted-by":"crossref","first-page":"208901","DOI":"10.1103\/PhysRevLett.101.208901","volume":"101","author":"F Gao","year":"2008","unstructured":"Gao, F., Guo, F., Wen, Q., Zhu, F.: Comment on experimental demonstration of a quantum protocol for byzantine agreement and liar detection. Phys. Rev. Lett. 101, 208901 (2008)","journal-title":"Phys. Rev. Lett."},{"key":"1289_CR30","doi-asserted-by":"crossref","first-page":"036301","DOI":"10.1103\/PhysRevA.63.036301","volume":"63","author":"Y Zhang","year":"2001","unstructured":"Zhang, Y., Li, C., Guo, G.: Comment on \u201cQuantum key distribution without alternative measurements\u201d [Phys. Rev. A 61, 052312 (2000)]. Phys. Rev. A 63, 036301 (2001)","journal-title":"Phys. Rev. A"},{"issue":"4","key":"1289_CR31","first-page":"329","volume":"7","author":"F Gao","year":"2007","unstructured":"Gao, F., Qin, S., Wen, Q., Zhu, F.: A simple participant attack on the Bradler\u2013Dusek protocol. Quantum Inf. Comput. 7(4), 329\u2013334 (2007)","journal-title":"Quantum Inf. Comput."},{"issue":"24","key":"1289_CR32","doi-asserted-by":"crossref","first-page":"5261","DOI":"10.1016\/j.optcom.2010.07.022","volume":"283","author":"T Wang","year":"2010","unstructured":"Wang, T., Wen, Q., Chen, X.: Cryptanalysis and improvement of a multi-user quantum key distribution protocol. Opt. Commun. 283(24), 5261\u20135263 (2010)","journal-title":"Opt. Commun."},{"issue":"9","key":"1289_CR33","doi-asserted-by":"crossref","first-page":"3189","DOI":"10.1088\/1674-1056\/17\/9\/006","volume":"17","author":"F Gao","year":"2008","unstructured":"Gao, F., Wen, Q., Zhu, F.: Teleportation attack on the QSDC protocol with a random basis and order. Chin. Phys. B 17(9), 3189 (2008)","journal-title":"Chin. Phys. B"},{"key":"1289_CR34","doi-asserted-by":"crossref","unstructured":"Wang, T., Wen, Q., Gao, F., et al.: Cryptanalysis and improvement of multiparty quantum secret sharing schemes. Phys. Lett. A 373(1), 65\u201368 (2008)","DOI":"10.1016\/j.physleta.2008.11.004"},{"issue":"5","key":"1289_CR35","doi-asserted-by":"crossref","first-page":"630","DOI":"10.1109\/JQE.2011.2107889","volume":"47","author":"F Gao","year":"2011","unstructured":"Gao, F., Qin, S., Guo, F., Wen, Q.: Dense-coding attack on three-party quantum key distribution protocols. IEEE J. Quantum Electron. 47(5), 630\u2013635 (2011)","journal-title":"IEEE J. Quantum Electron."},{"issue":"3","key":"1289_CR36","doi-asserted-by":"crossref","first-page":"491","DOI":"10.1007\/s11433-010-0145-7","volume":"53","author":"L Hao","year":"2010","unstructured":"Hao, L., Li, J., Long, G.: Eavesdropping in a quantum secret sharing protocol based on Grover algorithm and its solution. Sci. Chin. Phys. Mech. Astron. 53(3), 491\u2013495 (2010)","journal-title":"Sci. Chin. Phys. Mech. Astron."},{"issue":"2","key":"1289_CR37","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1016\/j.physleta.2006.04.030","volume":"357","author":"S Qin","year":"2006","unstructured":"Qin, S., Gao, F., Wen, Q., Zhu, F.: Improving the security of multiparty quantum secret sharing against an attack with a fake signal. Phys. Lett. A 357(2), 101\u2013103 (2006)","journal-title":"Phys. Lett. A"},{"key":"1289_CR38","doi-asserted-by":"crossref","first-page":"157901","DOI":"10.1103\/PhysRevLett.90.157901","volume":"90","author":"A Wjcik","year":"2003","unstructured":"Wjcik, A.: Eavesdropping on the Ping-Pong quantum communication protocol. Phys. Rev. Lett. 90, 157901 (2003)","journal-title":"Phys. Rev. Lett."},{"key":"1289_CR39","doi-asserted-by":"crossref","first-page":"016301","DOI":"10.1103\/PhysRevA.71.016301","volume":"71","author":"A Wjcik","year":"2005","unstructured":"Wjcik, A.: Comment on quantum dense key distribution. Phys. Rev. A 71, 016301 (2005)","journal-title":"Phys. Rev. A"},{"key":"1289_CR40","doi-asserted-by":"crossref","first-page":"109801","DOI":"10.1103\/PhysRevLett.91.109801","volume":"91","author":"Q Cai","year":"2003","unstructured":"Cai, Q.: The Ping-Pong protocol can be attacked without eavesdropping. Phys. Rev. Lett. 91, 109801 (2003)","journal-title":"Phys. Rev. Lett."},{"key":"1289_CR41","doi-asserted-by":"crossref","first-page":"014302","DOI":"10.1103\/PhysRevA.77.014302","volume":"77","author":"F Gao","year":"2008","unstructured":"Gao, F., Guo, F., Wen, Q., Hu, F.: Consistency of shared reference frames should be reexamined. Phys. Rev. A 77, 014302 (2008)","journal-title":"Phys. Rev. A"},{"issue":"6","key":"1289_CR42","doi-asserted-by":"crossref","first-page":"748","DOI":"10.1016\/j.physleta.2006.08.016","volume":"360","author":"F Gao","year":"2007","unstructured":"Gao, F., Wen, Q., Zhu, F.: Comment on: quantum exam [Phys. Lett. A 350 (2006) 174]. Phys. Lett. A 360(6), 748\u2013750 (2007)","journal-title":"Phys. Lett. A"},{"issue":"5","key":"1289_CR43","doi-asserted-by":"crossref","first-page":"1561","DOI":"10.1088\/0256-307X\/25\/5\/011","volume":"25","author":"F Gao","year":"2008","unstructured":"Gao, F., Lin, S., Wen, Q., Zhu, F.: A special eavesdropping on one-sender versus N-receiver QSDC protocol. Chin. Phys. Lett. 25(5), 1561 (2008)","journal-title":"Chin. Phys. Lett."},{"issue":"1","key":"1289_CR44","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1016\/j.optcom.2009.09.047","volume":"283","author":"F Gao","year":"2010","unstructured":"Gao, F., Qin, S., Wen, Q., Zhu, F.: Cryptanalysis of multiparty controlled quantum secure direct communication using Greenberger\u2013Horne\u2013Zeilinger state. Opt. Commun. 283(1), 192\u2013195 (2010)","journal-title":"Opt. Commun."},{"key":"1289_CR45","doi-asserted-by":"crossref","first-page":"022320","DOI":"10.1103\/PhysRevA.73.022320","volume":"73","author":"N Gisin","year":"2006","unstructured":"Gisin, N., Fasel, S., Kraus, B., Zbinden, H., Ribordy, G.: Trojan-horse attacks on quantum-key-distribution systems. Phys. Rev. A 73, 022320 (2006)","journal-title":"Phys. Rev. A"},{"key":"1289_CR46","doi-asserted-by":"crossref","first-page":"044302","DOI":"10.1103\/PhysRevA.72.044302","volume":"72","author":"F Deng","year":"2005","unstructured":"Deng, F., Li, X., Zhou, H., Zhang, Z.: Improving the security of multiparty quantum secret sharing against Trojan horse attack. Phys. Rev. A 72, 044302 (2005)","journal-title":"Phys. Rev. A"},{"issue":"12","key":"1289_CR47","doi-asserted-by":"crossref","first-page":"123030","DOI":"10.1088\/1367-2630\/16\/12\/123030","volume":"16","author":"N Jain","year":"2014","unstructured":"Jain, N., Anisimova, E., Khan, I., et al.: Trojan-horse attacks threaten the security of practical quantum cryptography. New J. Phys. 16(12), 123030 (2014)","journal-title":"New J. Phys."},{"issue":"2","key":"1289_CR48","doi-asserted-by":"crossref","first-page":"681","DOI":"10.1007\/s11128-014-0872-1","volume":"14","author":"YG Yang","year":"2014","unstructured":"Yang, Y.G., Sun, S.J., Zhao, Q.Q.: Trojan-horse attacks on quantum key distribution with classical Bob. Quantum Inf. Process. 14(2), 681\u2013686 (2014)","journal-title":"Quantum Inf. Process."},{"issue":"5","key":"1289_CR49","first-page":"434","volume":"11","author":"T Wang","year":"2011","unstructured":"Wang, T., Wen, Q.: Security of a kind of quantum secret sharing with single photons. Quantum Inf. Comput. 11(5), 434\u2013443 (2011)","journal-title":"Quantum Inf. Comput."},{"issue":"6","key":"1289_CR50","doi-asserted-by":"crossref","first-page":"1711","DOI":"10.1016\/j.optcom.2010.11.038","volume":"284","author":"T Wang","year":"2011","unstructured":"Wang, T., Wen, Q., Zhu, F.: Cryptanalysis of multiparty quantum secret sharing with Bell states and Bell measurements. Opt. Commun. 284(6), 1711\u20131713 (2011)","journal-title":"Opt. Commun."},{"issue":"6","key":"1289_CR51","doi-asserted-by":"crossref","first-page":"769","DOI":"10.1007\/s11082-013-9785-y","volume":"46","author":"Y Tian","year":"2014","unstructured":"Tian, Y., Chen, H., Ji, S., et al.: A broadcasting multiple blind signature scheme based on quantum teleportation. Opt. Quantum Electron. 46(6), 769\u2013777 (2014)","journal-title":"Opt. Quantum Electron."},{"issue":"2","key":"1289_CR52","doi-asserted-by":"crossref","first-page":"025101","DOI":"10.1088\/0031-8949\/90\/2\/025101","volume":"90","author":"T Kim","year":"2015","unstructured":"Kim, T., Choi, J.W., Jho, N.S., et al.: Quantum messages with signatures forgeable in arbitrated quantum signature schemes. Phys. Scr. 90(2), 025101 (2015)","journal-title":"Phys. Scr."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-016-1289-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-016-1289-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-016-1289-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T07:39:26Z","timestamp":1559374766000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-016-1289-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,15]]},"references-count":52,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2016,6]]}},"alternative-id":["1289"],"URL":"https:\/\/doi.org\/10.1007\/s11128-016-1289-9","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,3,15]]}}}