{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T17:06:34Z","timestamp":1763831194639,"version":"3.37.3"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2021,2,1]],"date-time":"2021-02-01T00:00:00Z","timestamp":1612137600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,2,1]],"date-time":"2021-02-01T00:00:00Z","timestamp":1612137600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Open Foundation of Guizhou Provincial Key Laboratory of Public Big Data","award":["2018BDKFJJ018"],"award-info":[{"award-number":["2018BDKFJJ018"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61671087","61962009"],"award-info":[{"award-number":["61671087","61962009"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["2019XD-A02"],"award-info":[{"award-number":["2019XD-A02"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Huawei Technologies Co. Ltd","award":["YBN2020085019"],"award-info":[{"award-number":["YBN2020085019"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2021,2]]},"DOI":"10.1007\/s11128-020-02966-1","type":"journal-article","created":{"date-parts":[[2021,2,10]],"date-time":"2021-02-10T09:08:58Z","timestamp":1612948138000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Quantum network coding without loss of information"],"prefix":"10.1007","volume":"20","author":[{"given":"Xing-Bo","family":"Pan","sequence":"first","affiliation":[]},{"given":"Gang","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Zong-Peng","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9761-3414","authenticated-orcid":false,"given":"Xiu-Bo","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Yi-Xian","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,10]]},"reference":[{"issue":"3","key":"2966_CR1","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1038\/nphoton.2007.22","volume":"1","author":"N Gisin","year":"2007","unstructured":"Gisin, N., Thew, R.: Quantum communication. Nat. Photonics 1(3), 165 (2007)","journal-title":"Nat. Photonics"},{"issue":"25","key":"2966_CR2","doi-asserted-by":"publisher","first-page":"4656","DOI":"10.1103\/PhysRevLett.76.4656","volume":"76","author":"K Mattle","year":"1996","unstructured":"Mattle, K., Weinfurter, H., Kwiat, P.G., et al.: Dense coding in experimental quantum communication. Phys. Rev. Lett. 76(25), 4656 (1996)","journal-title":"Phys. Rev. Lett."},{"issue":"6862","key":"2966_CR3","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1038\/35106500","volume":"414","author":"LM Duan","year":"2001","unstructured":"Duan, L.M., Lukin, M.D., Cirac, J.I., Zoller, P.: Long-distance quantum communication with atomic ensembles and linear optics. Nature 414(6862), 413 (2001)","journal-title":"Nature"},{"key":"2966_CR4","first-page":"1","volume":"2020","author":"J Dai","year":"2020","unstructured":"Dai, J., Deng, Y.: A new method to predict the interference effect in quantum-like Bayesian networks. Soft. Comput. 2020, 1\u20138 (2020)","journal-title":"Soft. Comput."},{"issue":"2","key":"2966_CR5","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1002\/int.22208","volume":"35","author":"X Gao","year":"2020","unstructured":"Gao, X., Deng, Y.: Quantum model of mass function. Int. J. Intell. Syst. 35(2), 267\u2013282 (2020)","journal-title":"Int. J. Intell. Syst."},{"key":"2966_CR6","doi-asserted-by":"publisher","first-page":"693","DOI":"10.1016\/j.physa.2018.07.044","volume":"512","author":"W Deng","year":"2018","unstructured":"Deng, W., Deng, Y.: Entropic methodology for entanglement measures. Phys. A: Stat. Mech. Appl. 512, 693\u2013697 (2018)","journal-title":"Phys. A: Stat. Mech. Appl."},{"issue":"13","key":"2966_CR7","doi-asserted-by":"publisher","first-page":"1895","DOI":"10.1103\/PhysRevLett.70.1895","volume":"70","author":"CH Bennett","year":"1993","unstructured":"Bennett, C.H., Brassard, G., Cr\u00e9peau, C., et al.: Teleporting an unknown quantum state via dual classical and Einstein\u2013Podolsky\u2013Rosen channels. Phys. Rev. Lett. 70(13), 1895 (1993)","journal-title":"Phys. Rev. Lett."},{"issue":"6660","key":"2966_CR8","doi-asserted-by":"publisher","first-page":"575","DOI":"10.1038\/37539","volume":"390","author":"D Bouwmeester","year":"1997","unstructured":"Bouwmeester, D., Pan, J.W., Mattle, K., et al.: Experimental quantum teleportation. Nature 390(6660), 575 (1997)","journal-title":"Nature"},{"issue":"7","key":"2966_CR9","doi-asserted-by":"publisher","first-page":"077902","DOI":"10.1103\/PhysRevLett.87.077902","volume":"87","author":"CH Bennett","year":"2001","unstructured":"Bennett, C.H., DiVincenzo, D.P., Shor, P.W., et al.: Remote state preparation. Phys. Rev. Lett. 87(7), 077902 (2001)","journal-title":"Phys. Rev. Lett."},{"issue":"12","key":"2966_CR10","doi-asserted-by":"publisher","first-page":"127905","DOI":"10.1103\/PhysRevLett.90.127905","volume":"90","author":"DW Leung","year":"2003","unstructured":"Leung, D.W., Shor, P.W.: Oblivious remote state preparation. Phys. Rev. Lett. 90(12), 127905 (2003)","journal-title":"Phys. Rev. Lett."},{"issue":"5","key":"2966_CR11","doi-asserted-by":"publisher","first-page":"052315","DOI":"10.1103\/PhysRevA.72.052315","volume":"72","author":"Z Kurucz","year":"2005","unstructured":"Kurucz, Z., Adam, P., Kis, Z., et al.: Continuous variable remote state preparation. Phys. Rev. A 72(5), 052315 (2005)","journal-title":"Phys. Rev. A"},{"issue":"6","key":"2966_CR12","doi-asserted-by":"publisher","first-page":"4249","DOI":"10.1103\/PhysRevA.59.4249","volume":"59","author":"JI Cirac","year":"1999","unstructured":"Cirac, J.I., Ekert, A.K., Huelga, S.F., et al.: Distributed quantum computation over noisy channels. Phys. Rev. A 59(6), 4249 (1999)","journal-title":"Phys. Rev. A"},{"issue":"1","key":"2966_CR13","doi-asserted-by":"publisher","first-page":"010503","DOI":"10.1103\/PhysRevLett.96.010503","volume":"96","author":"A Serafini","year":"2006","unstructured":"Serafini, A., Mancini, S., Bose, S.: Distributed quantum computation via optical fibers. Phys. Rev. Lett. 96(1), 010503 (2006)","journal-title":"Phys. Rev. Lett."},{"issue":"2","key":"2966_CR14","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1103\/PhysRevLett.85.441","volume":"85","author":"PW Shor","year":"2000","unstructured":"Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85(2), 441 (2000)","journal-title":"Phys. Rev. Lett."},{"issue":"12","key":"2966_CR15","doi-asserted-by":"publisher","first-page":"127902","DOI":"10.1103\/PhysRevLett.88.127902","volume":"88","author":"NJ Cerf","year":"2002","unstructured":"Cerf, N.J., Bourennane, M., Karlsson, A., et al.: Security of quantum key distribution using d-level systems. Phys. Rev. Lett. 88(12), 127902 (2002)","journal-title":"Phys. Rev. Lett."},{"issue":"13","key":"2966_CR16","doi-asserted-by":"publisher","first-page":"130503","DOI":"10.1103\/PhysRevLett.108.130503","volume":"108","author":"HK Lo","year":"2012","unstructured":"Lo, H.K., Curty, M., Qi, B.: Measurement-device-independent quantum key distribution. Phys. Rev. Lett. 108(13), 130503 (2012)","journal-title":"Phys. Rev. Lett."},{"key":"2966_CR17","doi-asserted-by":"crossref","unstructured":"Hayashi, M., Iwama, K., Nishimura, H.: Quantum network coding. In: Proceedings of the 24th Annual Conference on Theoretical Aspects of Computer Science. Berlin: Springer, pp. 610\u2013621 (2007)","DOI":"10.1007\/978-3-540-70918-3_52"},{"issue":"4","key":"2966_CR18","doi-asserted-by":"publisher","first-page":"040301","DOI":"10.1103\/PhysRevA.76.040301","volume":"76","author":"M Hayashi","year":"2007","unstructured":"Hayashi, M.: Prior entanglement between senders enables perfect quantum network coding with modification. Phys. Rev. A 76(4), 040301 (2007)","journal-title":"Phys. Rev. A"},{"issue":"3","key":"2966_CR19","doi-asserted-by":"publisher","first-page":"032331","DOI":"10.1103\/PhysRevA.86.032331","volume":"86","author":"T Satoh","year":"2012","unstructured":"Satoh, T., LeGall, F., Imai, H.: Quantum network coding for quantum repeaters. Phys. Rev. A 86(3), 032331 (2012)","journal-title":"Phys. Rev. A"},{"key":"2966_CR20","doi-asserted-by":"publisher","first-page":"13634","DOI":"10.1109\/ACCESS.2018.2890719","volume":"7","author":"XB Chen","year":"2019","unstructured":"Chen, X.B., Wang, Y.L., Xu, G., et al.: Quantum network communication with a novel discrete-time quantum walk. IEEE Access 7, 13634\u201313642 (2019)","journal-title":"IEEE Access"},{"issue":"2","key":"2966_CR21","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1109\/LCOMM.2014.2379253","volume":"19","author":"J Li","year":"2014","unstructured":"Li, J., Chen, X.B., Xu, G., et al.: Perfect quantum network coding independent of classical network solutions. IEEE Commun. Lett. 19(2), 115\u2013118 (2014)","journal-title":"IEEE Commun. Lett."},{"issue":"1","key":"2966_CR22","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1007\/s11128-018-2127-z","volume":"18","author":"Z Li","year":"2019","unstructured":"Li, Z., Xu, G., Chen, X.B., et al.: Secure quantum network coding based on quantum homomorphic message authentication. Quantum Inf. Process. 18(1), 14 (2019)","journal-title":"Quantum Inf. Process."},{"issue":"3","key":"2966_CR23","doi-asserted-by":"publisher","first-page":"032302","DOI":"10.1103\/PhysRevA.93.032302","volume":"93","author":"T Satoh","year":"2016","unstructured":"Satoh, T., Ishizaki, K., Nagayama, S., et al.: Analysis of quantum network coding for realistic repeater networks. Phys. Rev. A 93(3), 032302 (2016)","journal-title":"Phys. Rev. A"},{"key":"2966_CR24","doi-asserted-by":"crossref","unstructured":"Kobayashi, H., Le.Gall, F., Nishimura, H., Rotteler, M.: General scheme for perfect quantum network coding with free classical communication. In: Proceedings of 36th International Colloquium on Automata, Languages and Programming (ICALP), Lecture Note in Computer Science, vol. 5555, pp. 622-633 (2009)","DOI":"10.1007\/978-3-642-02927-1_52"},{"issue":"11","key":"2966_CR25","doi-asserted-by":"publisher","first-page":"4297","DOI":"10.1007\/s11128-015-1098-6","volume":"14","author":"G Xu","year":"2015","unstructured":"Xu, G., Chen, X.B., Li, J., Wang, C., Yang, Y.X., Li, Z.P.: Network coding for quantum cooperative multicast. Quantum Inf. Process. 14(11), 4297\u20134322 (2015)","journal-title":"Quantum Inf. Process."},{"issue":"10","key":"2966_CR26","doi-asserted-by":"publisher","first-page":"103052","DOI":"10.1088\/1367-2630\/18\/10\/103052","volume":"18","author":"M Epping","year":"2016","unstructured":"Epping, M., Kampermann, H., Bruss, D.: Robust entanglement distribution via quantum network coding. New J. Phys. 18(10), 103052 (2016)","journal-title":"New J. Phys."},{"issue":"1","key":"2966_CR27","doi-asserted-by":"publisher","first-page":"014001","DOI":"10.1088\/2058-9565\/aa8ac4","volume":"3","author":"M Owari","year":"2017","unstructured":"Owari, M., Kato, G., Hayashi, M.: Single-shot secure quantum network coding on butterfly network with free public communication. Quantum Science and Technology 3(1), 014001 (2017)","journal-title":"Quantum Science and Technology"},{"key":"2966_CR28","doi-asserted-by":"publisher","first-page":"1204","DOI":"10.1109\/18.850663","volume":"46","author":"R Ahlswede","year":"2000","unstructured":"Ahlswede, R., Cai, N., Li, S.Y.R., et al.: Network information flow. IEEE Trans. Inf. Theory 46, 1204\u20131216 (2000)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"1","key":"2966_CR29","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1109\/18.651037","volume":"44","author":"AS Holevo","year":"1998","unstructured":"Holevo, A.S.: The capacity of the quantum channel with general signal states. IEEE Trans. Inf. Theory 44(1), 269\u2013273 (1998)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"1","key":"2966_CR30","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/TIT.2004.839515","volume":"51","author":"I Devetak","year":"2005","unstructured":"Devetak, I.: The private classical capacity and quantum capacity of a quantum channel. IEEE Trans. Inf. Theory 51(1), 44\u201355 (2005)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"5886","key":"2966_CR31","doi-asserted-by":"publisher","first-page":"802","DOI":"10.1038\/299802a0","volume":"299","author":"WK Wootters","year":"1982","unstructured":"Wootters, W.K., Zurek, W.H.: A single quantum cannot be cloned. Nature 299(5886), 802\u2013803 (1982)","journal-title":"Nature"},{"issue":"3","key":"2966_CR32","doi-asserted-by":"publisher","first-page":"1844","DOI":"10.1103\/PhysRevA.54.1844","volume":"54","author":"V Bu\u017eek","year":"1996","unstructured":"Bu\u017eek, V., Hillery, M.: Quantum copying: beyond the no-cloning theorem. Phys. Rev. A 54(3), 1844 (1996)","journal-title":"Phys. Rev. A"},{"key":"2966_CR33","doi-asserted-by":"crossref","unstructured":"Kobayashi, H., Le.Gall, F., Nishimura, H., Rotteler, M.: Constructing quantum network coding schemes from classical nonlinear protocols. In: Proceedings of IEEE International Symposium Information Theory (ISIT), pp. 109\u2013113 (2011)","DOI":"10.1109\/ISIT.2011.6033701"},{"issue":"6","key":"2966_CR34","doi-asserted-by":"publisher","first-page":"062328","DOI":"10.1103\/PhysRevA.97.062328","volume":"97","author":"T Matsuo","year":"2018","unstructured":"Matsuo, T., Satoh, T., Nagayama, S., et al.: Analysis of measurement-based quantum network coding over repeater networks under noisy conditions. Phys. Rev. A 97(6), 062328 (2018)","journal-title":"Phys. Rev. A"},{"issue":"9","key":"2966_CR35","doi-asserted-by":"publisher","first-page":"3533","DOI":"10.1007\/s11128-015-1066-1","volume":"14","author":"T Shang","year":"2015","unstructured":"Shang, T., Li, J., Pei, Z., et al.: Quantum network coding for general repeater networks. Quantum Inf. Process. 14(9), 3533\u20133552 (2015)","journal-title":"Quantum Inf. Process."},{"issue":"4","key":"2966_CR36","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/s11128-017-1565-3","volume":"16","author":"T Shang","year":"2017","unstructured":"Shang, T., Li, K., Liu, J.: Continuous-variable quantum network coding for coherent states. Quantum Inf. Process. 16(4), 107 (2017)","journal-title":"Quantum Inf. Process."},{"issue":"3","key":"2966_CR37","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1016\/j.optcom.2009.09.065","volume":"283","author":"SY Ma","year":"2010","unstructured":"Ma, S.Y., Chen, X.B., Luo, M.X., et al.: Probabilistic quantum network coding of M-qudit states over the butterfly network. Opt. Commun. 283(3), 497\u2013501 (2010)","journal-title":"Opt. Commun."},{"key":"2966_CR38","doi-asserted-by":"publisher","first-page":"4287","DOI":"10.1103\/PhysRevLett.71.4287","volume":"71","author":"M Zukowski","year":"1993","unstructured":"Zukowski, M., Zeilinger, A., Horne, M.A., et al.: \u201cEvent-ready-detectors\u201d Bell experiment via entanglement swapping. Phys. Rev. Lett. 71, 4287\u20134290 (1993)","journal-title":"Phys. Rev. Lett."},{"issue":"2","key":"2966_CR39","doi-asserted-by":"publisher","first-page":"822","DOI":"10.1103\/PhysRevA.57.822","volume":"57","author":"S Bose","year":"1998","unstructured":"Bose, S., Vedral, V., Knight, P.L.: Multiparticle generalization of entanglement swapping. Phys. Rev. A 57(2), 822 (1998)","journal-title":"Phys. Rev. A"},{"key":"2966_CR40","doi-asserted-by":"publisher","first-page":"65","DOI":"10.2201\/NiiPi.2011.8.8","volume":"8","author":"R Van Meter","year":"2011","unstructured":"Van Meter, R., Touch, J., Horsman, C.: Recursive quantum repeater networks. Prog. Inform. 8, 65\u201379 (2011)","journal-title":"Prog. Inform."},{"issue":"23","key":"2966_CR41","doi-asserted-by":"publisher","first-page":"230501","DOI":"10.1103\/PhysRevLett.93.230501","volume":"93","author":"ARR Carvalho","year":"2004","unstructured":"Carvalho, A.R.R., Mintert, F., Buchleitner, A.: Decoherence and multipartite entanglement. Phys. Rev. Lett. 93(23), 230501 (2004)","journal-title":"Phys. Rev. Lett."},{"issue":"3","key":"2966_CR42","doi-asserted-by":"publisher","first-page":"033817","DOI":"10.1103\/PhysRevA.68.033817","volume":"68","author":"C Marr","year":"2003","unstructured":"Marr, C., Beige, A., Rempe, G.: Entangled-state preparation via dissipation-assisted adiabatic passages. Phys. Rev. A 68(3), 033817 (2003)","journal-title":"Phys. Rev. A"},{"issue":"1","key":"2966_CR43","doi-asserted-by":"publisher","first-page":"012344","DOI":"10.1103\/PhysRevA.91.012344","volume":"91","author":"L Roa","year":"2015","unstructured":"Roa, L., Groiseau, C.: Probabilistic teleportation without loss of information. Phys. Rev. A 91(1), 012344 (2015)","journal-title":"Phys. Rev. A"},{"key":"2966_CR44","volume-title":"Quantum Computation and Quantum Information","author":"MA Nielsen","year":"2000","unstructured":"Nielsen, M.A., Chuang, I.L.: Quantum Computation and Quantum Information. Cambridge University Press, Cambridge (2000)"},{"issue":"23","key":"2966_CR45","doi-asserted-by":"publisher","first-page":"230504","DOI":"10.1103\/PhysRevLett.94.230504","volume":"94","author":"HK Lo","year":"2005","unstructured":"Lo, H.K., Ma, X., Chen, K.: Decoy state quantum key distribution. Phys. Rev. Lett. 94(23), 230504 (2005)","journal-title":"Phys. Rev. Lett."},{"issue":"2","key":"2966_CR46","doi-asserted-by":"publisher","first-page":"022307","DOI":"10.1103\/PhysRevA.89.022307","volume":"89","author":"CCW Lim","year":"2014","unstructured":"Lim, C.C.W., Curty, M., Walenta, N., et al.: Concise security bounds for practical decoy-state quantum key distribution. Phys. Rev. A 89(2), 022307 (2014)","journal-title":"Phys. Rev. A"},{"issue":"3","key":"2966_CR47","doi-asserted-by":"publisher","first-page":"032324","DOI":"10.1103\/PhysRevA.94.032324","volume":"94","author":"SH Sun","year":"2016","unstructured":"Sun, S.H., Tang, G.Z., Li, C.Y., et al.: Experimental demonstration of passive-decoy state quantum key distribution with two independent lasers. Phys. Rev. A 94(3), 032324 (2016)","journal-title":"Phys. Rev. A"},{"key":"2966_CR48","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: International Conference on Computers, Systems and Signal Processing (Bangalore, India, Dec. 1984), pp. 175\u2013179 (1984)"},{"issue":"5410","key":"2966_CR49","doi-asserted-by":"publisher","first-page":"2050","DOI":"10.1126\/science.283.5410.2050","volume":"283","author":"HK Lo","year":"1999","unstructured":"Lo, H.K., Chau, H.F.: Unconditional security of quantum key distribution over arbitrarily long distances. Science 283(5410), 2050\u20132056 (1999)","journal-title":"Science"},{"issue":"3","key":"2966_CR50","doi-asserted-by":"publisher","first-page":"032324","DOI":"10.1103\/PhysRevA.94.032324","volume":"94","author":"SH Sun","year":"2016","unstructured":"Sun, S.H., Tang, G.Z., Li, C.Y., et al.: Experimental demonstration of passive-decoystate quantum key distribution with two independent lasers. Phys. Rev. A 94(3), 032324 (2016)","journal-title":"Phys. Rev. A"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-020-02966-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11128-020-02966-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-020-02966-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,29]],"date-time":"2023-01-29T04:55:27Z","timestamp":1674968127000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11128-020-02966-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2]]},"references-count":50,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2021,2]]}},"alternative-id":["2966"],"URL":"https:\/\/doi.org\/10.1007\/s11128-020-02966-1","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"type":"print","value":"1570-0755"},{"type":"electronic","value":"1573-1332"}],"subject":[],"published":{"date-parts":[[2021,2]]},"assertion":[{"value":"24 February 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 December 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 February 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"65"}}