{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T08:31:41Z","timestamp":1775032301169,"version":"3.50.1"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62301235"],"award-info":[{"award-number":["62301235"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006407","name":"Natural Science Foundation of Henan","doi-asserted-by":"crossref","award":["242300421219"],"award-info":[{"award-number":["242300421219"]}],"id":[{"id":"10.13039\/501100006407","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"DOI":"10.1007\/s11128-026-05148-7","type":"journal-article","created":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T05:40:30Z","timestamp":1775022030000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Performance analysis of practical reference-frame-independent quantum key distribution with weak randomness"],"prefix":"10.1007","volume":"25","author":[{"given":"Jian-Rong","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Yu-Hang","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Chuan-Hao","family":"Shu","sequence":"additional","affiliation":[]},{"given":"Chun-Mei","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Hong-Wei","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,4,1]]},"reference":[{"key":"5148_CR1","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, pp. 175\u2013179 (1984)"},{"issue":"6","key":"5148_CR2","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1103\/physrevlett.67.661","volume":"67","author":"AK Ekert","year":"1991","unstructured":"Ekert, A.K.: Quantum cryptography based on Bell\u2019s theorem. Phys. Rev. Lett. 67(6), 661\u2013663 (1991). https:\/\/doi.org\/10.1103\/physrevlett.67.661","journal-title":"Phys. Rev. Lett."},{"issue":"11","key":"5148_CR3","doi-asserted-by":"publisher","DOI":"10.1103\/physrevlett.107.110501","volume":"107","author":"N Jain","year":"2011","unstructured":"Jain, N., Wittmann, C., Lydersen, L., Wiechers, C., Elser, D., Marquardt, C., Makarov, V., Leuchs, G.: Device calibration impacts security of quantum key distribution. Phys. Rev. Lett. 107(11), 110501 (2011). https:\/\/doi.org\/10.1103\/physrevlett.107.110501","journal-title":"Phys. Rev. Lett."},{"issue":"8","key":"5148_CR4","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1140\/epjd\/e2014-40693-6","volume":"68","author":"Z-Y Dong","year":"2014","unstructured":"Dong, Z.-Y., Yu, N.-N., Wei, Z.-J., Wang, J.-D., Zhang, Z.-M.: An attack aimed at active phase compensation in one-way phase-encoded QKD systems. Eur. Phys. J. D 68(8), 230 (2014). https:\/\/doi.org\/10.1140\/epjd\/e2014-40693-6","journal-title":"Eur. Phys. J. D"},{"issue":"1","key":"5148_CR5","doi-asserted-by":"publisher","DOI":"10.1103\/physreva.82.012304","volume":"82","author":"A Laing","year":"2010","unstructured":"Laing, A., Scarani, V., Rarity, J.G., O\u2019Brien, J.L.: Reference-frame-independent quantum key distribution. Phys. Rev. A 82(1), 012304 (2010). https:\/\/doi.org\/10.1103\/physreva.82.012304","journal-title":"Phys. Rev. A"},{"issue":"5","key":"5148_CR6","doi-asserted-by":"publisher","first-page":"1237","DOI":"10.1007\/s11128-013-0726-2","volume":"13","author":"Z-Q Yin","year":"2014","unstructured":"Yin, Z.-Q., Wang, S., Chen, W., Li, H.-W., Guo, G.-C., Han, Z.-F.: Reference-free-independent quantum key distribution immune to detector side channel attacks. Quantum Inf. Process. 13(5), 1237\u20131244 (2014). https:\/\/doi.org\/10.1007\/s11128-013-0726-2","journal-title":"Quantum Inf. Process."},{"issue":"3","key":"5148_CR7","doi-asserted-by":"publisher","DOI":"10.1103\/physreva.95.032309","volume":"95","author":"C-M Zhang","year":"2017","unstructured":"Zhang, C.-M., Zhu, J.-R., Wang, Q.: Practical decoy-state reference-frame-independent measurement-device-independent quantum key distribution. Phys. Rev. A 95(3), 032309 (2017). https:\/\/doi.org\/10.1103\/physreva.95.032309","journal-title":"Phys. Rev. A"},{"issue":"4","key":"5148_CR8","doi-asserted-by":"publisher","DOI":"10.1103\/physreva.92.042319","volume":"92","author":"C Wang","year":"2015","unstructured":"Wang, C., Sun, S.-H., Ma, X.-C., Tang, G.-Z., Liang, L.-M.: Reference-frame-independent quantum key distribution with source flaws. Phys. Rev. A 92(4), 042319 (2015). https:\/\/doi.org\/10.1103\/physreva.92.042319","journal-title":"Phys. Rev. A"},{"issue":"5","key":"5148_CR9","doi-asserted-by":"publisher","DOI":"10.1103\/physreva.101.052318","volume":"101","author":"F-Y Lu","year":"2020","unstructured":"Lu, F.-Y., Yin, Z.-Q., Fan-Yuan, G.-J., Wang, R., Liu, H., Wang, S., Chen, W., He, D.-Y., Huang, W., Xu, B.-J., Guo, G.-C., Han, Z.-F.: Efficient decoy states for the reference-frame-independent measurement-device-independent quantum key distribution. Phys. Rev. A 101(5), 052318 (2020). https:\/\/doi.org\/10.1103\/physreva.101.052318","journal-title":"Phys. Rev. A"},{"issue":"7","key":"5148_CR10","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/15\/7\/073001","volume":"15","author":"J Wabnig","year":"2013","unstructured":"Wabnig, J., Bitauld, D., Li, H.W., Laing, A., O\u2019Brien, J.L., Niskanen, A.O.: Demonstration of free-space reference frame independent quantum key distribution. New J. Phys. 15(7), 073001 (2013). https:\/\/doi.org\/10.1088\/1367-2630\/15\/7\/073001","journal-title":"New J. Phys."},{"issue":"16","key":"5148_CR11","doi-asserted-by":"publisher","DOI":"10.1103\/physrevlett.115.160502","volume":"115","author":"C Wang","year":"2015","unstructured":"Wang, C., Song, X.-T., Yin, Z.-Q., Wang, S., Chen, W., Zhang, C.-M., Guo, G.-C., Han, Z.-F.: Phase-reference-free experiment of measurement-device-independent quantum key distribution. Phys. Rev. Lett. 115(16), 160502 (2015). https:\/\/doi.org\/10.1103\/physrevlett.115.160502","journal-title":"Phys. Rev. Lett."},{"issue":"6","key":"5148_CR12","doi-asserted-by":"publisher","first-page":"6784","DOI":"10.1364\/oe.25.006784","volume":"25","author":"H Chun","year":"2017","unstructured":"Chun, H., Choi, I., Faulkner, G., Clarke, L., Barber, B., George, G., Capon, C., Niskanen, A., Wabnig, J., O\u2019Brien, D., Bitauld, D.: Handheld free space quantum key distribution with dynamic motion compensation. Opt. Express 25(6), 6784 (2017). https:\/\/doi.org\/10.1364\/oe.25.006784","journal-title":"Opt. Express"},{"issue":"1","key":"5148_CR13","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1038\/s41534-022-00630-3","volume":"8","author":"B-Y Tang","year":"2022","unstructured":"Tang, B.-Y., Chen, H., Wang, J.-P., Yu, H.-C., Shi, L., Sun, S.-H., Peng, W., Liu, B., Yu, W.-R.: Free-running long-distance reference-frame-independent quantum key distribution. NPJ Quantum Inf. 8(1), 117 (2022). https:\/\/doi.org\/10.1038\/s41534-022-00630-3","journal-title":"NPJ Quantum Inf."},{"issue":"7","key":"5148_CR14","doi-asserted-by":"publisher","first-page":"812","DOI":"10.1364\/optica.458937","volume":"9","author":"G-J Fan-Yuan","year":"2022","unstructured":"Fan-Yuan, G.-J., Lu, F.-Y., Wang, S., Yin, Z.-Q., He, D.-Y., Chen, W., Zhou, Z., Wang, Z.-H., Teng, J., Guo, G.-C., Han, Z.-F.: Robust and adaptable quantum key distribution network without trusted nodes. Optica 9(7), 812 (2022). https:\/\/doi.org\/10.1364\/optica.458937","journal-title":"Optica"},{"issue":"6","key":"5148_CR15","doi-asserted-by":"publisher","DOI":"10.1103\/physrevapplied.22.064018","volume":"22","author":"X Liu","year":"2024","unstructured":"Liu, X., Luo, D., Luo, Z., Li, S., Zhang, Z., Wei, K.: Reference-frame-independent quantum key distribution over 250 km of optical fiber. Phys. Rev. Appl. 22(6), 064018 (2024). https:\/\/doi.org\/10.1103\/physrevapplied.22.064018","journal-title":"Phys. Rev. Appl."},{"issue":"7","key":"5148_CR16","doi-asserted-by":"publisher","DOI":"10.1007\/s11433-024-2618-y","volume":"68","author":"Z Tian","year":"2025","unstructured":"Tian, Z., Xie, Z., Chen, Y., Fan, X., Huang, J., Mu, T., Guo, J., Wei, K., Sun, S.: Reference-frame-independent quantum key distribution based on machine-learning-enhanced qubit-based synchronization. Sci. China Phys. Mech. Astron. 68(7), 270312 (2025). https:\/\/doi.org\/10.1007\/s11433-024-2618-y","journal-title":"Sci. China Phys. Mech. Astron."},{"issue":"16","key":"5148_CR17","doi-asserted-by":"publisher","first-page":"4219","DOI":"10.1364\/ol.470558","volume":"47","author":"J-R Zhu","year":"2022","unstructured":"Zhu, J.-R., Wang, R., Zhang, C.-M.: Improved reference-frame-independent quantum key distribution. Opt. Lett. 47(16), 4219 (2022). https:\/\/doi.org\/10.1364\/ol.470558","journal-title":"Opt. Lett."},{"issue":"13","key":"5148_CR18","doi-asserted-by":"publisher","first-page":"22460","DOI":"10.1364\/oe.522384","volume":"32","author":"Z Tian","year":"2024","unstructured":"Tian, Z., Xie, Z., Wang, R., Zhang, C., Sun, S.: Experimental demonstration of improved reference-frame-independent quantum key distribution over 175km. Opt. Express 32(13), 22460 (2024). https:\/\/doi.org\/10.1364\/oe.522384","journal-title":"Opt. Express"},{"issue":"3","key":"5148_CR19","doi-asserted-by":"publisher","first-page":"1301","DOI":"10.1103\/revmodphys.81.1301","volume":"81","author":"V Scarani","year":"2009","unstructured":"Scarani, V., Bechmann-Pasquinucci, H., Cerf, N.J., Du\u0161ek, M., L\u00fctkenhaus, N., Peev, M.: The security of practical quantum key distribution. Rev. Mod. Phys. 81(3), 1301\u20131350 (2009). https:\/\/doi.org\/10.1103\/revmodphys.81.1301","journal-title":"Rev. Mod. Phys."},{"issue":"2","key":"5148_CR20","doi-asserted-by":"publisher","DOI":"10.1103\/revmodphys.94.025008","volume":"94","author":"C Portmann","year":"2022","unstructured":"Portmann, C., Renner, R.: Security in quantum cryptography. Rev. Mod. Phys. 94(2), 025008 (2022). https:\/\/doi.org\/10.1103\/revmodphys.94.025008","journal-title":"Rev. Mod. Phys."},{"issue":"6","key":"5148_CR21","doi-asserted-by":"publisher","DOI":"10.1103\/physreva.86.062308","volume":"86","author":"J Bouda","year":"2012","unstructured":"Bouda, J., Pivoluska, M., Plesch, M., Wilmott, C.: Weak randomness seriously limits the security of quantum key distribution. Phys. Rev. A 86(6), 062308 (2012). https:\/\/doi.org\/10.1103\/physreva.86.062308","journal-title":"Phys. Rev. A"},{"issue":"3","key":"5148_CR22","doi-asserted-by":"publisher","DOI":"10.1103\/physreva.88.032309","volume":"88","author":"M Huber","year":"2013","unstructured":"Huber, M., Paw\u0142owski, M.: Weak randomness in device-independent quantum key distribution and the advantage of using high-dimensional entanglement. Phys. Rev. A 88(3), 032309 (2013). https:\/\/doi.org\/10.1103\/physreva.88.032309","journal-title":"Phys. Rev. A"},{"issue":"1","key":"5148_CR23","doi-asserted-by":"publisher","first-page":"16200","DOI":"10.1038\/srep16200","volume":"5","author":"H-W Li","year":"2015","unstructured":"Li, H.-W., Yin, Z.-Q., Wang, S., Qian, Y.-J., Chen, W., Guo, G.-C., Han, Z.-F.: Randomness determines practical security of BB84 quantum key distribution. Sci. Rep. 5(1), 16200 (2015). https:\/\/doi.org\/10.1038\/srep16200","journal-title":"Sci. Rep."},{"issue":"6","key":"5148_CR24","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/11\/6\/065001","volume":"11","author":"S Nauerth","year":"2009","unstructured":"Nauerth, S., F\u00fcrst, M., Schmitt-Manderbach, T., Weier, H., Weinfurter, H.: Information leakage via side channels in freespace BB84 quantum cryptography. New J. Phys. 11(6), 065001 (2009). https:\/\/doi.org\/10.1088\/1367-2630\/11\/6\/065001","journal-title":"New J. Phys."},{"issue":"6","key":"5148_CR25","doi-asserted-by":"publisher","DOI":"10.1103\/physreva.98.062325","volume":"98","author":"H-W Li","year":"2018","unstructured":"Li, H.-W., Xu, Z.-M., Cai, Q.-Y.: Small imperfect randomness restricts security of quantum key distribution. Phys. Rev. A 98(6), 062325 (2018). https:\/\/doi.org\/10.1103\/physreva.98.062325","journal-title":"Phys. Rev. A"},{"issue":"5","key":"5148_CR26","doi-asserted-by":"publisher","first-page":"1226","DOI":"10.1364\/ol.44.001226","volume":"44","author":"C-M Zhang","year":"2019","unstructured":"Zhang, C.-M., Wang, W.-B., Li, H.-W., Wang, Q.: Weak randomness impacts the security of reference-frame-independent quantum key distribution. Opt. Lett. 44(5), 1226 (2019). https:\/\/doi.org\/10.1364\/ol.44.001226","journal-title":"Opt. Lett."},{"issue":"01","key":"5148_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1142\/s0219749908003256","volume":"06","author":"R Renner","year":"2008","unstructured":"Renner, R.: Security of quantum key distribution. Int. J. Quantum Inf. 06(01), 1\u2013127 (2008). https:\/\/doi.org\/10.1142\/s0219749908003256","journal-title":"Int. J. Quantum Inf."},{"issue":"1","key":"5148_CR28","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1038\/s42005-022-00831-4","volume":"5","author":"H-W Li","year":"2022","unstructured":"Li, H.-W., Zhang, C.-M., Jiang, M.-S., Cai, Q.-Y.: Improving the performance of practical decoy-state quantum key distribution with advantage distillation technology. Commun. Phys. 5(1), 53 (2022). https:\/\/doi.org\/10.1038\/s42005-022-00831-4","journal-title":"Commun. Phys."},{"issue":"6","key":"5148_CR29","doi-asserted-by":"publisher","DOI":"10.1103\/physreva.107.062613","volume":"107","author":"X Liu","year":"2023","unstructured":"Liu, X., Luo, D., Zhang, Z., Wei, K.: Mode-pairing quantum key distribution with advantage distillation. Phys. Rev. A 107(6), 062613 (2023). https:\/\/doi.org\/10.1103\/physreva.107.062613","journal-title":"Phys. Rev. A"},{"issue":"2","key":"5148_CR30","doi-asserted-by":"publisher","DOI":"10.1103\/physreva.110.022605","volume":"110","author":"D Luo","year":"2024","unstructured":"Luo, D., Liu, X., Qin, K., Zhang, Z., Wei, K.: Practical asynchronous measurement-device-independent quantum key distribution with advantage distillation. Phys. Rev. A 110(2), 022605 (2024). https:\/\/doi.org\/10.1103\/physreva.110.022605","journal-title":"Phys. Rev. A"},{"issue":"3","key":"5148_CR31","doi-asserted-by":"publisher","first-page":"542","DOI":"10.1364\/ol.480427","volume":"48","author":"J-R Zhu","year":"2023","unstructured":"Zhu, J.-R., Zhang, C.-M., Wang, R., Li, H.-W.: Reference-frame-independent quantum key distribution with advantage distillation. Opt. Lett. 48(3), 542 (2023). https:\/\/doi.org\/10.1364\/ol.480427","journal-title":"Opt. Lett."},{"issue":"6","key":"5148_CR32","doi-asserted-by":"publisher","first-page":"9196","DOI":"10.1364\/oe.480570","volume":"31","author":"X-L Jiang","year":"2023","unstructured":"Jiang, X.-L., Wang, Y., Li, J.-J., Lu, Y.-F., Hao, C.-P., Zhou, C., Bao, W.-S.: Improving the performance of reference-frame-independent quantum key distribution with advantage distillation technology. Opt. Express 31(6), 9196 (2023). https:\/\/doi.org\/10.1364\/oe.480570","journal-title":"Opt. Express"},{"issue":"5","key":"5148_CR33","doi-asserted-by":"publisher","DOI":"10.1103\/physreva.109.052432","volume":"109","author":"C-M Zhang","year":"2024","unstructured":"Zhang, C.-M., Wang, Z., Wu, Y.-D., Zhu, J.-R., Wang, R., Li, H.-W.: Discrete-phase-randomized twin-field quantum key distribution with advantage distillation. Phys. Rev. A 109(5), 052432 (2024). https:\/\/doi.org\/10.1103\/physreva.109.052432","journal-title":"Phys. Rev. A"},{"issue":"1","key":"5148_CR34","doi-asserted-by":"publisher","DOI":"10.1103\/physrevapplied.21.014036","volume":"21","author":"Y Zhou","year":"2024","unstructured":"Zhou, Y., Wang, R.-Q., Zhang, C.-M., Yin, Z.-Q., Wang, Z.-H., Wang, S., Chen, W., Guo, G.-C., Han, Z.-F.: Sending-or-not-sending twin-field quantum key distribution with advantage distillation. Phys. Rev. Appl. 21(1), 014036 (2024). https:\/\/doi.org\/10.1103\/physrevapplied.21.014036","journal-title":"Phys. Rev. Appl."},{"issue":"9","key":"5148_CR35","doi-asserted-by":"publisher","DOI":"10.1088\/1674-1056\/adf4a9","volume":"34","author":"S Li","year":"2025","unstructured":"Li, S., Liu, X., Zhang, Z., Wei, K.: Mode-pairing quantum key distribution with multi-step advantage distillation. Chin. Phys. B 34(9), 090307 (2025). https:\/\/doi.org\/10.1088\/1674-1056\/adf4a9","journal-title":"Chin. Phys. B"},{"issue":"3","key":"5148_CR36","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/s11128-025-04707-8","volume":"24","author":"C-M Zhang","year":"2025","unstructured":"Zhang, C.-M., Wu, Y.-D., Zhu, J.-R., Li, H.-W.: Improving the performance of practical reference-frame-independent quantum key distribution under the afterpulse effect. Quantum Inf. Process. 24(3), 89 (2025). https:\/\/doi.org\/10.1007\/s11128-025-04707-8","journal-title":"Quantum Inf. Process."},{"issue":"5","key":"5148_CR37","doi-asserted-by":"publisher","DOI":"10.1103\/physrevlett.91.057901","volume":"91","author":"W-Y Hwang","year":"2003","unstructured":"Hwang, W.-Y.: Quantum key distribution with high loss: toward global secure communication. Phys. Rev. Lett. 91(5), 057901 (2003). https:\/\/doi.org\/10.1103\/physrevlett.91.057901","journal-title":"Phys. Rev. Lett."},{"issue":"23","key":"5148_CR38","doi-asserted-by":"publisher","DOI":"10.1103\/physrevlett.94.230503","volume":"94","author":"X-B Wang","year":"2005","unstructured":"Wang, X.-B.: Beating the photon-number-splitting attack in practical quantum cryptography. Phys. Rev. Lett. 94(23), 230503 (2005). https:\/\/doi.org\/10.1103\/physrevlett.94.230503","journal-title":"Phys. Rev. Lett."},{"issue":"23","key":"5148_CR39","doi-asserted-by":"publisher","DOI":"10.1103\/physrevlett.94.230504","volume":"94","author":"H-K Lo","year":"2005","unstructured":"Lo, H.-K., Ma, X., Chen, K.: Decoy state quantum key distribution. Phys. Rev. Lett. 94(23), 230504 (2005). https:\/\/doi.org\/10.1103\/physrevlett.94.230504","journal-title":"Phys. Rev. Lett."},{"issue":"6","key":"5148_CR40","doi-asserted-by":"publisher","first-page":"1330","DOI":"10.1103\/physrevlett.85.1330","volume":"85","author":"G Brassard","year":"2000","unstructured":"Brassard, G., L\u00fctkenhaus, N., Mor, T., Sanders, B.C.: Limitations on practical quantum cryptography. Phys. Rev. Lett. 85(6), 1330\u20131333 (2000). https:\/\/doi.org\/10.1103\/physrevlett.85.1330","journal-title":"Phys. Rev. Lett."},{"issue":"4","key":"5148_CR41","doi-asserted-by":"publisher","first-page":"493","DOI":"10.1214\/aoms\/1177729330","volume":"23","author":"H Chernoff","year":"1952","unstructured":"Chernoff, H.: A measure of asymptotic efficiency for tests of a hypothesis based on the sum of observations. Ann. Math. Stat. 23(4), 493\u2013507 (1952). https:\/\/doi.org\/10.1214\/aoms\/1177729330","journal-title":"Ann. Math. Stat."},{"issue":"1","key":"5148_CR42","doi-asserted-by":"publisher","DOI":"10.1103\/physreva.72.012326","volume":"72","author":"X Ma","year":"2005","unstructured":"Ma, X., Qi, B., Zhao, Y., Lo, H.-K.: Practical decoy state for quantum key distribution. Phys. Rev. A 72(1), 012326 (2005). https:\/\/doi.org\/10.1103\/physreva.72.012326","journal-title":"Phys. Rev. A"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-026-05148-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11128-026-05148-7","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-026-05148-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T05:40:32Z","timestamp":1775022032000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11128-026-05148-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,4,1]]},"references-count":42,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2026,4]]}},"alternative-id":["5148"],"URL":"https:\/\/doi.org\/10.1007\/s11128-026-05148-7","relation":{},"ISSN":["1573-1332"],"issn-type":[{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,4,1]]},"assertion":[{"value":"28 August 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 March 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 April 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"127"}}