{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T04:59:13Z","timestamp":1772859553275,"version":"3.50.1"},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2021,9,14]],"date-time":"2021-09-14T00:00:00Z","timestamp":1631577600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,9,14]],"date-time":"2021-09-14T00:00:00Z","timestamp":1631577600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Telecommun Syst"],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.1007\/s11235-021-00826-6","type":"journal-article","created":{"date-parts":[[2021,9,14]],"date-time":"2021-09-14T17:02:45Z","timestamp":1631638965000},"page":"539-557","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["A secure and efficient key agreement framework for critical energy infrastructure using mobile device"],"prefix":"10.1007","volume":"78","author":[{"given":"Akber Ali","family":"Khan","sequence":"first","affiliation":[]},{"given":"Vinod","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Musheer","family":"Ahmad","sequence":"additional","affiliation":[]},{"given":"B. B.","family":"Gupta","sequence":"additional","affiliation":[]},{"given":"Musheer","family":"Ahmad","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5068-2033","authenticated-orcid":false,"given":"Ahmed A.","family":"Abd\u00a0El-Latif","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,14]]},"reference":[{"key":"826_CR1","doi-asserted-by":"crossref","unstructured":"Zhang, W.-Z., Elgendy, I. A., Hammad, M., Iliyasu, A. M., Du, X., Guizani, M., & Abd El-Latif, A. A. (2020). Secure and optimized load balancing for multitier IoT and edge-cloud computing systems. IEEE Internet of Things Journal, 8(10), 8119\u20138132.","DOI":"10.1109\/JIOT.2020.3042433"},{"key":"826_CR2","doi-asserted-by":"publisher","first-page":"111223","DOI":"10.1109\/ACCESS.2020.2999468","volume":"8","author":"EM Abou-Nassar","year":"2020","unstructured":"Abou-Nassar, E. M., Iliyasu, A. M., El-Kafrawy, P. M., Song, O.-Y., Bashir, A. K., & Abd El-Latif, A. A. (2020). Ditrust chain: Towards blockchain-based trust models for sustainable healthcare IoT systems. IEEE Access, 8, 111223\u2013111238.","journal-title":"IEEE Access"},{"key":"826_CR3","doi-asserted-by":"publisher","unstructured":"Mirsadeghi, F., Rafsanjani, M. K., & Gupta, B. B. (2020). A trust infrastructure based authentication method for clustered vehicular ad hoc networks. Peer-to-Peer Networking and Applications., 14, 2537\u20132553. https:\/\/doi.org\/10.1007\/s12083-020-01010-4","DOI":"10.1007\/s12083-020-01010-4"},{"key":"826_CR4","doi-asserted-by":"crossref","unstructured":"Stergiou, C. L., Psannis, K. E., & Gupta, B. B. (2020). Iot-based big data secure management in the fog over a 6g wireless network. IEEE Internet of Things Journal, 8(7), 5164\u20135171.","DOI":"10.1109\/JIOT.2020.3033131"},{"key":"826_CR5","doi-asserted-by":"crossref","unstructured":"Abd El-Latif, A. A., Abd-El-Atty, B., Venegas-Andraca, S. E., Elwahsh, H., Piran, M. J., Bashir, A. K., et al. (2020). Providing end-to-end security using quantum walks in IoT networks. IEEE Access, 8, 92687\u201392696.","DOI":"10.1109\/ACCESS.2020.2992820"},{"key":"826_CR6","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1016\/j.future.2018.06.020","volume":"89","author":"R Gad","year":"2018","unstructured":"Gad, R., Talha, M., Abd El-Latif, A. A., Zorkany, M., Ayman, E.-S., Nawal, E.-F., & Muhammad, G. (2018). Iris recognition using multi-algorithmic approaches for cognitive internet of things (CIoT) framework. Future Generation Computer Systems, 89, 178\u2013191.","journal-title":"Future Generation Computer Systems"},{"key":"826_CR7","doi-asserted-by":"crossref","unstructured":"Mishra, A., Gupta, N., & Gupta, B. (2021). Defense mechanisms against DDoS attack based on entropy in SDN-cloud using pox controller. Telecommunication Systems, 77(1), 47\u201362.","DOI":"10.1007\/s11235-020-00747-w"},{"key":"826_CR8","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1016\/j.apenergy.2016.06.052","volume":"178","author":"K Zhou","year":"2016","unstructured":"Zhou, K., Yang, S., & Shao, Z. (2016). Energy internet: The business perspective. Applied Energy, 178, 212\u2013222.","journal-title":"Applied Energy"},{"key":"826_CR9","doi-asserted-by":"publisher","first-page":"e4946","DOI":"10.1002\/cpe.4946","volume":"32","author":"B Gupta","year":"2020","unstructured":"Gupta, B., & Quamara, M. (2020). An overview of internet of things (IoT): Architectural aspects, challenges, and protocols. Concurrency and Computation: Practice and Experience, 32, e4946.","journal-title":"Concurrency and Computation: Practice and Experience"},{"key":"826_CR10","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/TII.2012.2218253","volume":"9","author":"VC Gungor","year":"2012","unstructured":"Gungor, V. C., Sahin, D., Kocak, T., Ergut, S., Buccella, C., Cecati, C., & Hancke, G. P. (2012). A survey on smart grid potential applications and communication requirements. IEEE Transactions on Industrial Informatics, 9, 28\u201342.","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"826_CR11","doi-asserted-by":"crossref","unstructured":"Gharavi, H., & Ghafurian, R. (2011). Smart grid: The electric energy system of the future (Vol. 99). IEEE.","DOI":"10.1109\/JPROC.2011.2124210"},{"key":"826_CR12","doi-asserted-by":"publisher","first-page":"102549","DOI":"10.1016\/j.ipm.2021.102549","volume":"58","author":"AA Abd El-Latif","year":"2021","unstructured":"Abd El-Latif, A. A., Abd-El-Atty, B., Mehmood, I., Muhammad, K., Venegas-Andraca, S. E., & Peng, J. (2021). Quantum-inspired blockchain-based cybersecurity: Securing smart edge utilities in IoT-based smart cities. Information Processing & Management, 58, 102549.","journal-title":"Information Processing & Management"},{"key":"826_CR13","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1016\/j.ins.2018.02.060","volume":"479","author":"D Li","year":"2019","unstructured":"Li, D., Deng, L., Gupta, B. B., Wang, H., & Choi, C. (2019). A novel CNN based security guaranteed image watermarking generation scenario for smart city applications. Information Sciences, 479, 432\u2013447.","journal-title":"Information Sciences"},{"key":"826_CR14","doi-asserted-by":"publisher","first-page":"849","DOI":"10.1016\/j.future.2018.01.029","volume":"93","author":"AS Sani","year":"2019","unstructured":"Sani, A. S., Yuan, D., Jin, J., Gao, L., Yu, S., & Dong, Z. Y. (2019). Cyber security framework for internet of things-based energy internet. Future Generation Computer Systems, 93, 849\u2013859.","journal-title":"Future Generation Computer Systems"},{"key":"826_CR15","doi-asserted-by":"publisher","unstructured":"Aggarwal, S., Kumar, N., & Gope, P. (2021). An efficient blockchain-based authentication scheme for energy-trading in v2g networks. IEEE Transactions on Industrial Informatics, 17(10), 6971\u20136980. https:\/\/doi.org\/10.1109\/TII.2020.3030949","DOI":"10.1109\/TII.2020.3030949"},{"key":"826_CR16","volume-title":"Towards an intelligent future energy grid","author":"Z Dong","year":"2016","unstructured":"Dong, Z. (2016). Towards an intelligent future energy grid. New South Wales: The University of Sydney."},{"key":"826_CR17","doi-asserted-by":"publisher","unstructured":"Canetti, R., & Krawczyk, H. (2001). Analysis of key-exchange protocols and their use for building secure channels. In International conference on the theory and applications of cryptographic techniques (pp. 453\u2013474). Springer. https:\/\/doi.org\/10.1007\/3-540-44987-6_28","DOI":"10.1007\/3-540-44987-6_28"},{"key":"826_CR18","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1109\/TSG.2011.2120634","volume":"2","author":"D Wu","year":"2011","unstructured":"Wu, D., & Zhou, C. (2011). Fault-tolerant and scalable key management for smart grid. IEEE Transactions on Smart Grid, 2, 375\u2013381.","journal-title":"IEEE Transactions on Smart Grid"},{"key":"826_CR19","doi-asserted-by":"publisher","first-page":"1437","DOI":"10.1109\/TSG.2012.2199141","volume":"3","author":"J Xia","year":"2012","unstructured":"Xia, J., & Wang, Y. (2012). Secure key distribution for the smart grid. IEEE Transactions on Smart Grid, 3, 1437\u20131443.","journal-title":"IEEE Transactions on Smart Grid"},{"key":"826_CR20","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1109\/TSG.2012.2226252","volume":"4","author":"H Nicanfar","year":"2013","unstructured":"Nicanfar, H., & Leung, V. C. (2013). Multilayer consensus ECC-based password authenticated key-exchange (MCEPAK) protocol for smart grid system. IEEE Transactions on Smart Grid, 4, 253\u2013264.","journal-title":"IEEE Transactions on Smart Grid"},{"key":"826_CR21","doi-asserted-by":"publisher","first-page":"1613","DOI":"10.1109\/TSG.2013.2258823","volume":"4","author":"JH Park","year":"2013","unstructured":"Park, J. H., Kim, M., & Kwon, D. (2013). Security weakness in the smart grid key distribution scheme proposed by Xia and Wang. IEEE Transactions on Smart Grid, 4, 1613\u20131614.","journal-title":"IEEE Transactions on Smart Grid"},{"key":"826_CR22","first-page":"1900","volume":"9","author":"V Odelu","year":"2016","unstructured":"Odelu, V., Das, A. K., Wazid, M., & Conti, M. (2016). Provably secure authenticated key agreement scheme for smart grid. IEEE Transactions on Smart Grid, 9, 1900\u20131910.","journal-title":"IEEE Transactions on Smart Grid"},{"key":"826_CR23","first-page":"906","volume":"7","author":"J-L Tsai","year":"2016","unstructured":"Tsai, J.-L., & Lo, N.-W. (2016). Secure anonymous key distribution scheme for smart grid. IEEE Transactions on Smart Grid, 7, 906\u2013914.","journal-title":"IEEE Transactions on Smart Grid"},{"key":"826_CR24","doi-asserted-by":"publisher","first-page":"1354","DOI":"10.3390\/en10091354","volume":"10","author":"Y Chen","year":"2017","unstructured":"Chen, Y., Mart\u00ednez, J.-F., Castillejo, P., & L\u00f3pez, L. (2017). An anonymous authentication and key establish scheme for smart grid: Fauth. Energies, 10, 1354.","journal-title":"Energies"},{"key":"826_CR25","doi-asserted-by":"publisher","first-page":"3953","DOI":"10.1109\/TSG.2018.2844403","volume":"10","author":"P Gope","year":"2018","unstructured":"Gope, P., & Sikdar, B. (2018). Privacy-aware authenticated key agreement scheme for secure smart grid communication. IEEE Transactions on Smart Grid, 10, 3953\u20133962.","journal-title":"IEEE Transactions on Smart Grid"},{"key":"826_CR26","doi-asserted-by":"publisher","first-page":"2834","DOI":"10.1109\/TSG.2016.2620939","volume":"9","author":"A Mohammadali","year":"2016","unstructured":"Mohammadali, A., Haghighi, M. S., Tadayon, M. H., & Mohammadi-Nodooshan, A. (2016). A novel identity-based key establishment method for advanced metering infrastructure in smart grid. IEEE Transactions on Smart Grid, 9, 2834\u20132842.","journal-title":"IEEE Transactions on Smart Grid"},{"key":"826_CR27","doi-asserted-by":"publisher","first-page":"6607","DOI":"10.1109\/TSG.2019.2908698","volume":"10","author":"P Gope","year":"2019","unstructured":"Gope, P., & Sikdar, B. (2019). An efficient privacy-preserving authentication scheme for energy internet-based vehicle-to-grid communication. IEEE Transactions on Smart Grid, 10, 6607\u20136618.","journal-title":"IEEE Transactions on Smart Grid"},{"key":"826_CR28","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1016\/j.jpdc.2017.11.008","volume":"132","author":"X Li","year":"2019","unstructured":"Li, X., Wu, F., Kumari, S., Xu, L., Sangaiah, A. K., & Choo, K.-K.R. (2019). A provably secure and anonymous message authentication scheme for smart grids. Journal of Parallel and Distributed Computing, 132, 242\u2013249.","journal-title":"Journal of Parallel and Distributed Computing"},{"key":"826_CR29","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1016\/j.future.2017.05.002","volume":"81","author":"K Mahmood","year":"2018","unstructured":"Mahmood, K., Chaudhry, S. A., Naqvi, H., Kumari, S., Li, X., & Sangaiah, A. K. (2018). An elliptic curve cryptography based lightweight authentication scheme for smart grid communication. Future Generation Computer Systems, 81, 557\u2013565.","journal-title":"Future Generation Computer Systems"},{"key":"826_CR30","doi-asserted-by":"publisher","first-page":"1795","DOI":"10.1049\/iet-com.2016.0091","volume":"10","author":"D He","year":"2016","unstructured":"He, D., Wang, H., Khan, M. K., & Wang, L. (2016). Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography. IET Communications, 10, 1795\u20131802.","journal-title":"IET Communications"},{"key":"826_CR31","doi-asserted-by":"publisher","first-page":"102053","DOI":"10.1016\/j.sysarc.2021.102053","volume":"116","author":"AA Khan","year":"2021","unstructured":"Khan, A. A., Kumar, V., Ahmad, M., & Rana, S. (2021). Lakaf: Lightweight authentication and key agreement framework for smart grid network. Journal of Systems Architecture, 116, 102053.","journal-title":"Journal of Systems Architecture"},{"key":"826_CR32","doi-asserted-by":"publisher","first-page":"697","DOI":"10.1109\/TSG.2011.2140343","volume":"2","author":"Z Yang","year":"2011","unstructured":"Yang, Z., Yu, S., Lou, W., & Liu, C. (2011). Privacy-preserving communication and precise reward architecture for v2g networks in smart grid. IEEE Transactions on Smart Grid, 2, 697\u2013706.","journal-title":"IEEE Transactions on Smart Grid"},{"key":"826_CR33","doi-asserted-by":"publisher","first-page":"707","DOI":"10.1109\/TSG.2011.2168243","volume":"2","author":"H Guo","year":"2011","unstructured":"Guo, H., Wu, Y., Bao, F., Chen, H., & Ma, M. (2011). Ubapv2g: A unique batch authentication protocol for vehicle-to-grid communications. IEEE Transactions on Smart Grid, 2, 707\u2013714.","journal-title":"IEEE Transactions on Smart Grid"},{"key":"826_CR34","doi-asserted-by":"publisher","first-page":"2615","DOI":"10.1109\/TVT.2016.2577018","volume":"66","author":"A Abdallah","year":"2016","unstructured":"Abdallah, A., & Shen, X. S. (2016). Lightweight authentication and privacy-preserving scheme for v2g connections. IEEE Transactions on Vehicular Technology, 66, 2615\u20132629.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"826_CR35","doi-asserted-by":"publisher","first-page":"155645","DOI":"10.1109\/ACCESS.2020.3019367","volume":"8","author":"M Tanveer","year":"2020","unstructured":"Tanveer, M., Zahid, A. H., Ahmad, M., Baz, A., & Alhakami, H. (2020). Lake-IoD: Lightweight authenticated key exchange protocol for the internet of drone environment. IEEE Access, 8, 155645\u2013155659.","journal-title":"IEEE Access"},{"key":"826_CR36","doi-asserted-by":"publisher","first-page":"648","DOI":"10.1109\/TCYB.2017.2647904","volume":"48","author":"M Luo","year":"2017","unstructured":"Luo, M., Chang, X., Nie, L., Yang, Y., Hauptmann, A. G., & Zheng, Q. (2017a). An adaptive semisupervised feature analysis for video semantic recognition. IEEE Transactions on Cybernetics, 48, 648\u2013660.","journal-title":"IEEE Transactions on Cybernetics"},{"key":"826_CR37","doi-asserted-by":"publisher","first-page":"944","DOI":"10.1109\/TNNLS.2017.2650978","volume":"29","author":"M Luo","year":"2017","unstructured":"Luo, M., Nie, F., Chang, X., Yang, Y., Hauptmann, A. G., & Zheng, Q. (2017b). Adaptive unsupervised feature selection with structure regularization. IEEE Transactions on Neural Networks and Learning Systems, 29, 944\u2013956.","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"key":"826_CR38","unstructured":"Stallings, W. (2006). Cryptography and Network Security, 4\/E, Pearson Education India."},{"key":"826_CR39","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1080\/09720529.2019.1637155","volume":"22","author":"A Kumari","year":"2019","unstructured":"Kumari, A., Yahya Abbasi, M., Kumar, V., & Khan, A. A. (2019). A secure user authentication protocol using elliptic curve cryptography. Journal of Discrete Mathematical Sciences and Cryptography, 22, 521\u2013530.","journal-title":"Journal of Discrete Mathematical Sciences and Cryptography"},{"key":"826_CR40","doi-asserted-by":"publisher","unstructured":"Khan, A. A., Kumar, V., & Ahmad, M. (2019). An elliptic curve cryptography based mutual authentication scheme for smart grid communications using biometric approach. Journal of King Saud University-Computer and Information Sciences. https:\/\/doi.org\/10.1016\/j.jksuci.2019.04.013","DOI":"10.1016\/j.jksuci.2019.04.013"},{"key":"826_CR41","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1007\/s10623-005-6344-y","volume":"38","author":"DR Stinson","year":"2006","unstructured":"Stinson, D. R. (2006). Some observations on the theory of cryptographic hash functions. Designs, Codes and Cryptography, 38, 259\u2013277.","journal-title":"Designs, Codes and Cryptography"},{"key":"826_CR42","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-017-0844-y","volume":"42","author":"V Kumar","year":"2018","unstructured":"Kumar, V., Jangirala, S., & Ahmad, M. (2018). An efficient mutual authentication framework for healthcare system in cloud computing. Journal of Medical Systems, 42, 1\u201325.","journal-title":"Journal of Medical Systems"},{"key":"826_CR43","doi-asserted-by":"crossref","unstructured":"Wang, W., Huang, H., Zhang, L., & Su, C. (2021). Secure and efficient mutual authentication protocol for smart grid under blockchain. Peer-to-Peer Networking and Applications, 14(5), 2681\u20132693.","DOI":"10.1007\/s12083-020-01020-2"},{"key":"826_CR44","doi-asserted-by":"publisher","first-page":"7996","DOI":"10.1109\/TIE.2018.2807383","volume":"65","author":"D Abbasinezhad-Mood","year":"2018","unstructured":"Abbasinezhad-Mood, D., & Nikooghadam, M. (2018). An anonymous ECC-based self-certified key distribution scheme for the smart grid. IEEE Transactions on Industrial Electronics, 65, 7996\u20138004.","journal-title":"IEEE Transactions on Industrial Electronics"},{"key":"826_CR45","doi-asserted-by":"publisher","first-page":"2261","DOI":"10.1007\/s11071-014-1584-x","volume":"78","author":"SH Islam","year":"2014","unstructured":"Islam, S. H. (2014). Provably secure dynamic identity-based three-factor password authentication scheme using extended chaotic maps. Nonlinear Dynamics, 78, 2261\u20132276.","journal-title":"Nonlinear Dynamics"},{"key":"826_CR46","doi-asserted-by":"publisher","first-page":"106121","DOI":"10.1016\/j.ijepes.2020.106121","volume":"121","author":"AA Khan","year":"2020","unstructured":"Khan, A. A., Kumar, V., Ahmad, M., Rana, S., & Mishra, D. (2020). Palk: Password-based anonymous lightweight key agreement framework for smart grid. International Journal of Electrical Power & Energy Systems, 121, 106121.","journal-title":"International Journal of Electrical Power & Energy Systems"},{"key":"826_CR47","doi-asserted-by":"crossref","unstructured":"Chaudhry, S. A., Naqvi, H., Sher, M., Farash, M. S., & Hassan, M. U. (2017). An improved and provably secure privacy preserving authentication protocol for sip. Peer-to-Peer Networking and Applications, 10, 1\u201315.","DOI":"10.1007\/s12083-015-0400-9"},{"key":"826_CR48","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1098\/rspa.1989.0125","volume":"426","author":"M Burrows","year":"1989","unstructured":"Burrows, M., Abadi, M., & Needham, R. M. (1989). A logic of authentication. Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences, 426, 233\u2013271.","journal-title":"Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences"},{"key":"826_CR49","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1016\/j.jksuci.2014.12.007","volume":"29","author":"A Chaturvedi","year":"2017","unstructured":"Chaturvedi, A., Mishra, D., & Mukhopadhyay, S. (2017). An enhanced dynamic id-based authentication scheme for telecare medical information systems. Journal of King Saud University-Computer and Information Sciences, 29, 54\u201362.","journal-title":"Journal of King Saud University-Computer and Information Sciences"},{"key":"826_CR50","doi-asserted-by":"publisher","first-page":"100213","DOI":"10.1016\/j.vehcom.2019.100213","volume":"22","author":"V Kumar","year":"2020","unstructured":"Kumar, V., Ahmad, M., Mishra, D., Kumari, S., & Khan, M. K. (2020). Rseap: Rfid based secure and efficient authentication protocol for vehicular cloud computing. Vehicular Communications, 22, 100213.","journal-title":"Vehicular Communications"},{"key":"826_CR51","unstructured":"Armando, A., Basin, D., Cuellar, J., Rusinowitch, M., & Vigan\u00f3, L. (2006). Avispa: automated validation of internet security protocols and applications. ERCIM News,64, 76"},{"key":"826_CR52","doi-asserted-by":"crossref","unstructured":"Armando, A., Basin, D., Boichut, Y., Chevalier, Y., Compagna, L., Cu\u00e9llar, J., Drielsma, P. H., H\u00e9am, P.-C. , Kouchnarenko, O., Mantovani, J., et\u00a0al. (2005). The avispa tool for the automated validation of internet security protocols and applications. In International conference on computer aided verification (pp. 281\u2013285). Springer, Berlin.","DOI":"10.1007\/11513988_27"}],"container-title":["Telecommunication Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-021-00826-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11235-021-00826-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-021-00826-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,28]],"date-time":"2021-10-28T17:10:33Z","timestamp":1635441033000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11235-021-00826-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,14]]},"references-count":52,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["826"],"URL":"https:\/\/doi.org\/10.1007\/s11235-021-00826-6","relation":{},"ISSN":["1018-4864","1572-9451"],"issn-type":[{"value":"1018-4864","type":"print"},{"value":"1572-9451","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,9,14]]},"assertion":[{"value":"28 July 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 September 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}