{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T17:49:23Z","timestamp":1767116963292},"reference-count":59,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2015,3,28]],"date-time":"2015-03-28T00:00:00Z","timestamp":1427500800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1007\/s11277-015-2524-x","type":"journal-article","created":{"date-parts":[[2015,3,28]],"date-time":"2015-03-28T23:37:55Z","timestamp":1427585875000},"page":"2055-2078","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":61,"title":["A Secure Authentication Scheme with User Anonymity for Roaming Service in Global Mobility Networks"],"prefix":"10.1007","volume":"84","author":[{"given":"Marimuthu","family":"Karuppiah","sequence":"first","affiliation":[]},{"given":"R.","family":"Saravanan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,3,28]]},"reference":[{"issue":"8","key":"2524_CR1","doi-asserted-by":"crossref","first-page":"1608","DOI":"10.1109\/49.634798","volume":"15","author":"S Suzuki","year":"1997","unstructured":"Suzuki, S., & Nakada, K. (1997). An authentication technique based on distributed security management for the global mobility network. IEEE Journal on Selected Areas in Communications, 15(8), 1608\u20131617.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"8","key":"2524_CR2","doi-asserted-by":"crossref","first-page":"1390","DOI":"10.1109\/TPDS.2010.206","volume":"22","author":"X Huang","year":"2011","unstructured":"Huang, X., Xiang, Y., Chonka, A., Zhou, J., & Deng, R. H. (2011). A generic framework for three-factor authentication: Preserving security and privacy in distributed systems. IEEE Transactions on Parallel and Distributed Systems, 22(8), 1390\u20131397.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"issue":"1","key":"2524_CR3","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1109\/TCE.2004.1277867","volume":"50","author":"J Zhu","year":"2004","unstructured":"Zhu, J., & Ma, J. (2004). A new authentication scheme with anonymity for wireless environments. IEEE Transactions on Consumer Electronics, 50(1), 231\u2013235.","journal-title":"IEEE Transactions on Consumer Electronics"},{"issue":"5","key":"2524_CR4","doi-asserted-by":"crossref","first-page":"1683","DOI":"10.1109\/TIE.2006.881998","volume":"53","author":"C-C Lee","year":"2006","unstructured":"Lee, C.-C., Hwang, M.-S., & Liao, I.-E. (2006). Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Transactions on Industrial Electronics, 53(5), 1683\u20131687.","journal-title":"IEEE Transactions on Industrial Electronics"},{"key":"2524_CR5","doi-asserted-by":"crossref","unstructured":"Wei, Y., Qiu, H., & Hu, Y. (2006) Security analysis of authentication scheme with anonymity for wireless environments. In International conference on communication technology, 2006 (ICCT\u201906) (pp. 1\u20134), IEEE.","DOI":"10.1109\/ICCT.2006.341724"},{"issue":"10","key":"2524_CR6","doi-asserted-by":"crossref","first-page":"722","DOI":"10.1109\/LCOMM.2008.080283","volume":"12","author":"W Chia-Chun","year":"2008","unstructured":"Chia-Chun, W., Lee, W.-B., & Tsaur, W.-J. (2008). A secure authentication scheme with anonymity for wireless communications. IEEE Communications Letters, 12(10), 722\u2013723.","journal-title":"IEEE Communications Letters"},{"issue":"4","key":"2524_CR7","doi-asserted-by":"crossref","first-page":"460","DOI":"10.4218\/etrij.09.0209.0026","volume":"31","author":"X Jing","year":"2009","unstructured":"Jing, X., & Feng, D. (2009). Security flaws in authentication protocols with anonymity for wireless environments. ETRI Journal, 31(4), 460\u2013462.","journal-title":"ETRI Journal"},{"issue":"5","key":"2524_CR8","doi-asserted-by":"crossref","first-page":"292","DOI":"10.1109\/LCOMM.2009.090074","volume":"13","author":"J-S Lee","year":"2009","unstructured":"Lee, J.-S., Chang, J. H., & Lee, D. H. (2009). Security flaw of authentication scheme with anonymity for wireless communications. IEEE Communications Letters, 13(5), 292\u2013293.","journal-title":"IEEE Communications Letters"},{"key":"2524_CR9","doi-asserted-by":"crossref","unstructured":"Wang, C.-H., Wei, T.-C., Lee, P.-C., & Wu, C.-C. (2009). An improvement of secure authentication scheme with full anonymity for wireless communications. In Proceedings of the 2nd international conference on interaction sciences: information technology, culture and human (pp. 115\u2013118), ACM.","DOI":"10.1145\/1655925.1655947"},{"key":"2524_CR10","doi-asserted-by":"crossref","unstructured":"Jeon, W., Kim, J., Lee, Y., & Won, D. (2012). Security analysis of authentication scheme for wireless communications with user anonymity. In Information technology convergence, secure and trust computing, and data management (pp. 225\u2013231). Berlin: Springer.","DOI":"10.1007\/978-94-007-5083-8_28"},{"issue":"4","key":"2524_CR11","doi-asserted-by":"crossref","first-page":"611","DOI":"10.1016\/j.comcom.2008.11.032","volume":"32","author":"C-C Chang","year":"2009","unstructured":"Chang, C.-C., Lee, C.-Y., & Chiu, Y.-C. (2009). Enhanced authentication scheme with anonymity for roaming service in global mobility networks. Computer Communications, 32(4), 611\u2013618.","journal-title":"Computer Communications"},{"issue":"7","key":"2524_CR12","doi-asserted-by":"crossref","first-page":"471","DOI":"10.1109\/LCOMM.2009.090488","volume":"13","author":"T-Y Youn","year":"2009","unstructured":"Youn, T.-Y., Park, Y.-H., & Lim, J. (2009). Weaknesses in an anonymous authentication scheme for roaming service in global mobility networks. IEEE Communications Letters, 13(7), 471\u2013473.","journal-title":"IEEE Communications Letters"},{"issue":"3","key":"2524_CR13","doi-asserted-by":"crossref","first-page":"170","DOI":"10.1109\/LCOMM.2009.081821","volume":"13","author":"P Zeng","year":"2009","unstructured":"Zeng, P., Cao, Z., Choo, K., & Wang, S. (2009). On the anonymity of some authentication schemes for wireless communications. IEEE Communications Letters, 13(3), 170\u2013171.","journal-title":"IEEE Communications Letters"},{"issue":"3","key":"2524_CR14","doi-asserted-by":"crossref","first-page":"367","DOI":"10.1016\/j.comcom.2010.02.031","volume":"34","author":"D He","year":"2011","unstructured":"He, D., Ma, M., Zhang, Y., Chen, C., & Jiajun, B. (2011). A strong user authentication scheme with smart cards for wireless communications. Computer Communications, 34(3), 367\u2013374.","journal-title":"Computer Communications"},{"issue":"1","key":"2524_CR15","first-page":"35","volume":"55","author":"C-T Li","year":"2012","unstructured":"Li, C.-T., & Lee, C.-C. (2012). A novel user authentication and privacy preserving scheme with smart cards for wireless communications. Mathematical and Computer Modelling, 55(1), 35\u201344.","journal-title":"Mathematical and Computer Modelling"},{"key":"2524_CR16","unstructured":"Jeon, W., Lee, Y., & Won, D. (2013). An efficient user authentication scheme with smart cards for wireless communications. International Journal of Security & Its Applications, 7(4), 1\u20135."},{"issue":"1\u20132","key":"2524_CR17","first-page":"12","volume":"2","author":"Ashok Kumar Das","year":"2013","unstructured":"Ashok Kumar Das. (2013). A secure and effective user authentication and privacy preserving protocol with smart cards for wireless communications. Networking Science, 2(1\u20132), 12\u201327.","journal-title":"Networking Science"},{"issue":"6","key":"2524_CR18","doi-asserted-by":"crossref","first-page":"987","DOI":"10.1002\/sec.816","volume":"7","author":"F Wen","year":"2014","unstructured":"Wen, F., Susilo, W., & Yang, G. (2014). A robust smart card-based anonymous user authentication protocol for wireless communications. Security and Communication Networks, 7(6), 987\u2013993.","journal-title":"Security and Communication Networks"},{"issue":"3","key":"2524_CR19","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1016\/j.comcom.2010.04.041","volume":"34","author":"X Jing","year":"2011","unstructured":"Jing, X., Zhu, W.-T., & Feng, D.-G. (2011). An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks. Computer Communications, 34(3), 319\u2013325.","journal-title":"Computer Communications"},{"key":"2524_CR20","unstructured":"Rhee, H. S. (2011). Improved user authentication scheme with user anonymity for wireless communications. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences,94(2), 860\u2013864."},{"issue":"5","key":"2524_CR21","first-page":"297","volume":"14","author":"H Jian-bin","year":"2012","unstructured":"Jian-bin, H., Xiong, H., & Chen, Z. (2012). Further improvement of an authentication scheme with user anonymity for wireless communications. IJ Network Security, 14(5), 297\u2013300.","journal-title":"IJ Network Security"},{"issue":"2","key":"2524_CR22","doi-asserted-by":"crossref","first-page":"465","DOI":"10.1007\/s11277-010-0033-5","volume":"61","author":"D He","year":"2011","unstructured":"He, D., Chan, S., Chen, C., Jiajun, B., & Fan, R. (2011). Design and validation of an efficient authentication scheme with anonymity for roaming service in global mobility networks. Wireless Personal Communications, 61(2), 465\u2013476.","journal-title":"Wireless Personal Communications"},{"issue":"3","key":"2524_CR23","doi-asserted-by":"crossref","first-page":"356","DOI":"10.1016\/j.compeleceng.2011.03.002","volume":"37","author":"E-J Yoon","year":"2011","unstructured":"Yoon, E.-J., Yoo, K.-Y., & Ha, K.-S. (2011). A user friendly authentication scheme with anonymity for wireless communications. Computers & Electrical Engineering, 37(3), 356\u2013364.","journal-title":"Computers & Electrical Engineering"},{"key":"2524_CR24","doi-asserted-by":"crossref","unstructured":"Niu, J., & Li, X. (2014). A novel user authentication scheme with anonymity for wireless communications. Security and Communication Networks, 7(10), 1467\u20131476.","DOI":"10.1002\/sec.601"},{"issue":"1","key":"2524_CR25","first-page":"69","volume":"41","author":"C-T Li","year":"2012","unstructured":"Li, C.-T. (2012). A more secure and efficient authentication scheme with roaming service and user anonymity for mobile communications. Information Technology and Control, 41(1), 69\u201376.","journal-title":"Information Technology and Control"},{"issue":"1","key":"2524_CR26","doi-asserted-by":"crossref","first-page":"214","DOI":"10.1016\/j.mcm.2011.04.036","volume":"55","author":"H Mun","year":"2012","unstructured":"Mun, H., Han, K., Lee, Y. S., Yeun, C. Y., & Choi, H. H. (2012). Enhanced secure anonymous authentication scheme for roaming service in global mobility networks. Mathematical and Computer Modelling, 55(1), 214\u2013222.","journal-title":"Mathematical and Computer Modelling"},{"issue":"3","key":"2524_CR27","first-page":"45","volume":"6","author":"J-S Kim","year":"2012","unstructured":"Kim, J.-S., & Kwak, J. (2012). Improved secure anonymous authentication scheme for roaming service in global mobility networks. International Journal of Security and Its Applications, 6(3), 45\u201354.","journal-title":"International Journal of Security and Its Applications"},{"issue":"4","key":"2524_CR28","doi-asserted-by":"crossref","first-page":"1477","DOI":"10.1007\/s11277-012-0535-4","volume":"68","author":"Q Jiang","year":"2013","unstructured":"Jiang, Q., Ma, J., Li, G., & Yang, L. (2013). An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks. Wireless Personal Communications, 68(4), 1477\u20131491.","journal-title":"Wireless Personal Communications"},{"issue":"3","key":"2524_CR29","doi-asserted-by":"crossref","first-page":"993","DOI":"10.1007\/s11277-013-1243-4","volume":"73","author":"F Wen","year":"2013","unstructured":"Wen, F., Susilo, W., & Yang, G. (2013). A secure and effective anonymous user authentication scheme for roaming service in global mobility networks. Wireless Personal Communications, 73(3), 993\u20131004.","journal-title":"Wireless Personal Communications"},{"key":"2524_CR30","unstructured":"Li, H., Yang, Y., & Pang, L. (2013). An efficient authentication protocol with user anonymity for mobile networks. In 2013 IEEE wireless communications and networking conference (WCNC) (pp. 1842\u20131847), IEEE."},{"issue":"2","key":"2524_CR31","doi-asserted-by":"crossref","first-page":"601","DOI":"10.1007\/s11277-013-1309-3","volume":"74","author":"Q Xie","year":"2014","unstructured":"Xie, Q., Bin, H., Tan, X., Bao, M., & Xiuyuan, Y. (2014). Robust anonymous two-factor authentication scheme for roaming service in global mobility network. Wireless Personal Communications, 74(2), 601\u2013614.","journal-title":"Wireless Personal Communications"},{"issue":"4","key":"2524_CR32","doi-asserted-by":"crossref","first-page":"732","DOI":"10.1007\/s11390-013-1371-z","volume":"28","author":"X Jing","year":"2013","unstructured":"Jing, X., & Zhu, W.-T. (2013). A generic framework for anonymous authentication in mobile networks. Journal of Computer Science and Technology, 28(4), 732\u2013742.","journal-title":"Journal of Computer Science and Technology"},{"key":"2524_CR33","doi-asserted-by":"crossref","unstructured":"Zhao, D., Peng, H., Li, L., & Yang, Y. (2013). A secure and effective anonymous authentication scheme for roaming service in global mobility networks. Wireless Personal Communications, 78(1), 247\u2013269.","DOI":"10.1007\/s11277-014-1750-y"},{"key":"2524_CR34","unstructured":"Hu, B., Bao, M., & Dong, N. (2014). Improvement of user authentication protocol with anonymity for wireless communications. Kuwait Journal of Science, 41(1), 155\u2013169."},{"key":"2524_CR35","doi-asserted-by":"crossref","unstructured":"Kuo, W.-C., Wei, H.-J., & Cheng, J.-C. (2014). An efficient and secure anonymous mobility network authentication scheme. Journal of Information Security and Applications, 19(1), 18\u201324.","DOI":"10.1016\/j.jisa.2013.12.002"},{"key":"2524_CR36","unstructured":"Liu, J., Wang, D., & Wang, P. (2014). Improved privacy-preserving authentication scheme for roaming service in mobile networks. In 2014 IEEE wireless communications and networking conference (WCNC)."},{"issue":"1","key":"2524_CR37","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1007\/s11277-013-1351-1","volume":"75","author":"N Zhou","year":"2014","unstructured":"Zhou, N., Chen, X., Li, C., & Xue, Z. (2014). Secrecy rate of two-hop af relaying networks with an untrusted relay. Wireless Personal Communications, 75(1), 119\u2013129.","journal-title":"Wireless Personal Communications"},{"key":"2524_CR38","doi-asserted-by":"crossref","unstructured":"Jiang, Q., Ma, J., Li, G., & Yang, L. (2014). An efficient ticket based authentication protocol with unlinkability for wireless access networks. Wireless Personal Communications, 77(2), 1489\u20131506.","DOI":"10.1007\/s11277-013-1594-x"},{"issue":"2","key":"2524_CR39","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1007\/s11277-013-1282-x","volume":"74","author":"D He","year":"2014","unstructured":"He, D., Zhang, Y., & Chen, J. (2014). Cryptanalysis and improvement of an anonymous authentication protocol for wireless access networks. Wireless Personal Communications, 74(2), 229\u2013243.","journal-title":"Wireless Personal Communications"},{"key":"2524_CR40","doi-asserted-by":"crossref","unstructured":"ElGamal, T. (1985). A public key cryptosystem and a signature scheme based on discrete logarithms. In Advances in cryptology (pp. 10\u201318). Berlin: Springer.","DOI":"10.1007\/3-540-39568-7_2"},{"key":"2524_CR41","unstructured":"Rivest, R. (1992). Rfc 1321: The md5 message-digest algorithm. Technical report RFC 1321, IETFl."},{"key":"2524_CR42","unstructured":"Secure Hash Standard. Technical report fips pub 180-1. US Department of Commerce\/National Institute of Standards and Technology, 1995."},{"issue":"6","key":"2524_CR43","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffie","year":"1976","unstructured":"Diffie, W., & Hellman, M. E. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22(6), 644\u2013654.","journal-title":"IEEE Transactions on Information Theory"},{"issue":"2","key":"2524_CR44","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"RL Rivest","year":"1978","unstructured":"Rivest, R. L., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2), 120\u2013126.","journal-title":"Communications of the ACM"},{"issue":"4","key":"2524_CR45","doi-asserted-by":"crossref","first-page":"723","DOI":"10.1016\/j.csi.2008.09.006","volume":"31","author":"X Jing","year":"2009","unstructured":"Jing, X., Zhu, W.-T., & Feng, D.-G. (2009). An improved smart card based password authentication scheme with provable security. Computer Standards & Interfaces, 31(4), 723\u2013728.","journal-title":"Computer Standards & Interfaces"},{"key":"2524_CR46","doi-asserted-by":"crossref","unstructured":"Kocher, P., Jaffe, J., & Jun, B. (1999). Differential power analysis. In Advances in cryptology (CRYPTO99) (pp. 388\u2013397). Berlin: Springer","DOI":"10.1007\/3-540-48405-1_25"},{"issue":"5","key":"2524_CR47","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"TS Messerges","year":"2002","unstructured":"Messerges, T. S., Dabbish, E. A., & Sloan, R. H. (2002). Examining smart-card security under the threat of power analysis attacks. IEEE Transactions on Computers, 51(5), 541\u2013552.","journal-title":"IEEE Transactions on Computers"},{"key":"2524_CR48","doi-asserted-by":"crossref","unstructured":"Wang, D., Ma, C., & Wu, P. (2012). Secure password-based remote user authentication scheme with non-tamper resistant smart cards. In Data and applications security and privacy XXVI (pp. 114\u2013121). Berlin: Springer","DOI":"10.1007\/978-3-642-31540-4_9"},{"issue":"2","key":"2524_CR49","first-page":"67","volume":"20","author":"SK Sood","year":"2011","unstructured":"Sood, S. K. (2011). Secure dynamic identity-based authentication scheme using smart cards. Information Security Journal: A Global Perspective, 20(2), 67\u201377.","journal-title":"Information Security Journal: A Global Perspective"},{"key":"2524_CR50","unstructured":"Tapiador, J. E., Hernandez-Castro, J. C., Peris-Lopez, P., & Clark, J. A. (2011). Cryptanalysis of song\u2019s advanced smart card based password authentication protocol. arXiv preprint arXiv:1111.2744"},{"issue":"1","key":"2524_CR51","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1080\/01611194.2011.606352","volume":"36","author":"K-A Shim","year":"2012","unstructured":"Shim, K.-A. (2012). Security flaws in three password-based remote user authentication schemes with smart cards. Cryptologia, 36(1), 62\u201369.","journal-title":"Cryptologia"},{"issue":"1","key":"2524_CR52","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1007\/s11277-012-0696-1","volume":"70","author":"D He","year":"2013","unstructured":"He, D., & Shuhua, W. (2013). Security flaws in a smart card based authentication scheme for multi-server environment. Wireless Personal Communications, 70(1), 323\u2013329.","journal-title":"Wireless Personal Communications"},{"key":"2524_CR53","doi-asserted-by":"crossref","unstructured":"Wang, D., Ma, C., Gu, D., & Cui, Z. (2012). Cryptanalysis of two dynamic id-based remote user authentication schemes for multi-server architecture. In Network and system security (pp. 462\u2013475). Berlin: Springer.","DOI":"10.1007\/978-3-642-34601-9_35"},{"key":"2524_CR54","doi-asserted-by":"crossref","unstructured":"Ma, C., Wang, D., & Zhao, S.-D. (2014). Security flaws in two improved remote user authentication schemes using smart cards. International Journal of Communication Systems, 27(10), 2215\u20132227.","DOI":"10.1002\/dac.2468"},{"key":"2524_CR55","first-page":"208","volume":"2014","author":"D Wang","year":"2014","unstructured":"Wang, D., & Wang, P. (2014). Offline dictionary attack on password authentication schemes using smart cards. IACR Cryptology ePrint Archive, 2014, 208.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"2524_CR56","doi-asserted-by":"crossref","unstructured":"Wang, D., & Wang, P. (2014). On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions. Computer Networks, 73(14), 41\u201357.","DOI":"10.1016\/j.comnet.2014.07.010"},{"issue":"4\u20135","key":"2524_CR57","doi-asserted-by":"crossref","first-page":"282","DOI":"10.1016\/j.jisa.2014.09.006","volume":"19","author":"M Karuppiah","year":"2014","unstructured":"Karuppiah, M., & Saravanan, R. (2014). A secure remote user mutual authentication scheme using smart cards. International Journal of Security and Its Applications, 19(4\u20135), 282\u2013294.","journal-title":"International Journal of Security and Its Applications"},{"key":"2524_CR58","doi-asserted-by":"crossref","unstructured":"Kasper, T., Oswald, D., & Paar, C. (2012). Side-channel analysis of cryptographic rfids with analog demodulation. In RFID security and privacy (pp. 61\u201377). Berlin: Springer.","DOI":"10.1007\/978-3-642-25286-0_5"},{"key":"2524_CR59","doi-asserted-by":"crossref","unstructured":"Scott, M., Costigan, N., & Abdulwahab, W. (2006). Implementing cryptographic pairings on smartcards. In Cryptographic hardware and embedded systems (CHES 2006) (pp. 134\u2013147). Berlin: Springer.","DOI":"10.1007\/11894063_11"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-015-2524-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-015-2524-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-015-2524-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,8]],"date-time":"2024-06-08T02:19:26Z","timestamp":1717813166000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-015-2524-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,3,28]]},"references-count":59,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2015,10]]}},"alternative-id":["2524"],"URL":"https:\/\/doi.org\/10.1007\/s11277-015-2524-x","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,3,28]]}}}