{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:31:30Z","timestamp":1772119890207,"version":"3.50.1"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,4,28]],"date-time":"2023-04-28T00:00:00Z","timestamp":1682640000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,4,28]],"date-time":"2023-04-28T00:00:00Z","timestamp":1682640000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2023,7]]},"DOI":"10.1007\/s11277-023-10427-y","type":"journal-article","created":{"date-parts":[[2023,4,28]],"date-time":"2023-04-28T11:01:57Z","timestamp":1682679717000},"page":"251-270","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Design and Implementation of Power-Efficient Cryptography Scheme Using a Novel Multiplication Technique"],"prefix":"10.1007","volume":"131","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8413-4764","authenticated-orcid":false,"given":"B.","family":"Srikanth","sequence":"first","affiliation":[]},{"given":"J. V. R.","family":"Ravindra","sequence":"additional","affiliation":[]},{"given":"P.","family":"Ramakrishna","sequence":"additional","affiliation":[]},{"given":"D.","family":"Ajitha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,4,28]]},"reference":[{"key":"10427_CR1","doi-asserted-by":"publisher","unstructured":"Fritzmann, T., & Sep\u00falveda, J. (2019). Efficient and flexible low-power NTT for lattice-based cryptography. In 2019 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). IEEE. https:\/\/doi.org\/10.1109\/HST.2019.8741027.","DOI":"10.1109\/HST.2019.8741027"},{"key":"10427_CR2","doi-asserted-by":"publisher","unstructured":"Dutta, I. K., Ghosh, B., & Bayoumi, M. (2019). Lightweight cryptography for internet of insecure things: A survey. In 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC). IEEE. https:\/\/doi.org\/10.1109\/CCWC.2019.8666557.","DOI":"10.1109\/CCWC.2019.8666557"},{"issue":"9","key":"10427_CR3","doi-asserted-by":"publisher","first-page":"1614","DOI":"10.1109\/TCSII.2020.3012448","volume":"67","author":"LY Yeh","year":"2020","unstructured":"Yeh, L. Y., Chen, P. J., Pai, C. C., & Liu, T. T. (2020). An energy-efficient dual-field elliptic curve cryptography processor for Internet of Things applications. IEEE Transactions on Circuits and Systems II: Express Briefs, 67(9), 1614\u20131618. https:\/\/doi.org\/10.1109\/TCSII.2020.3012448","journal-title":"IEEE Transactions on Circuits and Systems II: Express Briefs"},{"key":"10427_CR4","doi-asserted-by":"publisher","first-page":"73898","DOI":"10.1109\/ACCESS.2020.2988379","volume":"8","author":"MM Islam","year":"2020","unstructured":"Islam, M. M., Hossain, M. S., Shahjalal, M. D., Hasan, M. K., & Jang, Y. M. (2020). Area-time efficient hardware implementation of modular multiplication for elliptic curve cryptography. IEEE Access, 8, 73898\u201373906. https:\/\/doi.org\/10.1109\/ACCESS.2020.2988379","journal-title":"IEEE Access"},{"key":"10427_CR5","doi-asserted-by":"publisher","unstructured":"Karl, P., & Gruber, M. (2021). A survey on the application of fault analysis on lightweight cryptography. In 2021 11th IFIP International Conference on New Technologies, Mobility and Security (NTMS). IEEE. https:\/\/doi.org\/10.1109\/NTMS49979.2021.9432667.","DOI":"10.1109\/NTMS49979.2021.9432667"},{"issue":"10","key":"10427_CR6","doi-asserted-by":"publisher","first-page":"2301","DOI":"10.1140\/epjst\/e2019-900044-x","volume":"228","author":"AP James","year":"2019","unstructured":"James, A. P. (2019). An overview of memristive cryptography. The European Physical Journal Special Topics, 228(10), 2301\u20132312. https:\/\/doi.org\/10.1140\/epjst\/e2019-900044-x","journal-title":"The European Physical Journal Special Topics"},{"issue":"3","key":"10427_CR7","doi-asserted-by":"publisher","first-page":"4161","DOI":"10.1007\/s12652-020-01795-5","volume":"12","author":"S Karthikeyan","year":"2021","unstructured":"Karthikeyan, S., & Jagadeeswari, M. (2021). Performance improvement of elliptic curve cryptography system using low power, high speed 16\u00d7 16 Vedic multiplier based on reversible logic. Journal of Ambient Intelligence and Humanized Computing, 12(3), 4161\u20134170. https:\/\/doi.org\/10.1007\/s12652-020-01795-5","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"issue":"1","key":"10427_CR8","doi-asserted-by":"publisher","first-page":"547","DOI":"10.1007\/s12652-020-02020-z","volume":"12","author":"R Qazi","year":"2021","unstructured":"Qazi, R., Qureshi, K. N., Bashir, F., Islam, N. U., Iqbal, S., & Arshad, A. (2021). Security protocol using elliptic curve cryptography algorithm for wireless sensor networks. Journal of Ambient Intelligence and Humanized Computing, 12(1), 547\u2013566. https:\/\/doi.org\/10.1007\/s12652-020-02020-z","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"key":"10427_CR9","doi-asserted-by":"publisher","DOI":"10.1080\/03772063.2019.1670103","author":"TK Goyal","year":"2019","unstructured":"Goyal, T. K., Sahula, V., & Kumawat, D. (2019). Energy efficient lightweight cryptography algorithms for IoT devices. IETE Journal of Research. https:\/\/doi.org\/10.1080\/03772063.2019.1670103","journal-title":"IETE Journal of Research"},{"key":"10427_CR10","doi-asserted-by":"publisher","unstructured":"Gao, L., Zheng, F., Emmart, N., Dong, J., Lin, J., & Weems, C. (2020). DPF-ECC: accelerating elliptic curve cryptography with floating-point computing power of gpus. In 2020 IEEE International Parallel and Distributed Processing Symposium (IPDPS). IEEE. https:\/\/doi.org\/10.1109\/IPDPS47924.2020.00058.","DOI":"10.1109\/IPDPS47924.2020.00058"},{"key":"10427_CR11","doi-asserted-by":"publisher","first-page":"175865","DOI":"10.1109\/ACCESS.2019.2957943","volume":"7","author":"HN Almajed","year":"2019","unstructured":"Almajed, H. N., & Almogren, A. S. (2019). SE-ENC: A secure and efficient encoding scheme using elliptic curve cryptography. IEEE Access, 7, 175865\u2013175878. https:\/\/doi.org\/10.1109\/ACCESS.2019.2957943","journal-title":"IEEE Access"},{"key":"10427_CR12","doi-asserted-by":"publisher","first-page":"101938","DOI":"10.1016\/j.sysarc.2020.101938","volume":"114","author":"D Sadhukhan","year":"2021","unstructured":"Sadhukhan, D., Ray, S., Obaidat, M. S., & Dasgupta, M. (2021). A secure and privacy preserving lightweight authentication scheme for smart-grid communication using elliptic curve cryptography. Journal of Systems Architecture, 114, 101938. https:\/\/doi.org\/10.1016\/j.sysarc.2020.101938","journal-title":"Journal of Systems Architecture"},{"key":"10427_CR13","doi-asserted-by":"publisher","unstructured":"Yassin, H. M., Mohamed, A. T., Abdel-Gawad, A. H., Tolba, M. F., Saleh, H. I., Madian, A. H., & Radwan, A. G. (2019). Speech encryption on FPGA using a chaotic generator and S-Box table. In 2019 Fourth International Conference on Advances in Computational Tools for Engineering Applications (ACTEA). IEEE. https:\/\/doi.org\/10.1109\/ACTEA.2019.8851086.","DOI":"10.1109\/ACTEA.2019.8851086"},{"key":"10427_CR14","doi-asserted-by":"publisher","unstructured":"Abdul Basith, K., & Shankar, T. N. (2021). Energy and efficient privacy cryptography-based Fuzzy K-Means clustering a WSN using genetic algorithm. In International Conference on Intelligent and Smart Computing in Data Analytics (pp. 291\u2013304). Springer. https:\/\/doi.org\/10.1007\/978-981-33-6176-8_32.","DOI":"10.1007\/978-981-33-6176-8_32"},{"key":"10427_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2019.04.013","author":"AA Khan","year":"2019","unstructured":"Khan, A. A., Kumar, V., & Ahmad, M. (2019). An elliptic curve cryptography based mutual authentication scheme for smart grid communications using biometric approach. Journal of King Saud University-Computer and Information Sciences. https:\/\/doi.org\/10.1016\/j.jksuci.2019.04.013","journal-title":"Journal of King Saud University-Computer and Information Sciences"},{"key":"10427_CR16","doi-asserted-by":"publisher","first-page":"8737","DOI":"10.1109\/ACCESS.2018.2886384","volume":"7","author":"M Sharafi","year":"2019","unstructured":"Sharafi, M., Fotouhi-Ghazvini, F., Shirali, M., & Ghassemian, M. (2019). A low power cryptography solution based on chaos theory in wireless sensor nodes. IEEE Access, 7, 8737\u20138753. https:\/\/doi.org\/10.1109\/ACCESS.2018.2886384","journal-title":"IEEE Access"},{"issue":"3","key":"10427_CR17","doi-asserted-by":"publisher","first-page":"2513","DOI":"10.1007\/s11277-020-07992-x","volume":"117","author":"M Benssalah","year":"2021","unstructured":"Benssalah, M., Sarah, I., & Drouiche, K. (2021). An efficient RFID authentication scheme based on elliptic curve cryptography for Internet of Things. Wireless Personal Communications, 117(3), 2513\u20132539. https:\/\/doi.org\/10.1007\/s11277-020-07992-x","journal-title":"Wireless Personal Communications"},{"issue":"10","key":"10427_CR18","doi-asserted-by":"publisher","first-page":"2459","DOI":"10.1109\/TVLSI.2019.2922999","volume":"27","author":"W Liu","year":"2019","unstructured":"Liu, W., Fan, S., Khalid, A., Rafferty, C., & O\u2019Neill, M. (2019). Optimized schoolbook polynomial multiplication for compact lattice-based cryptography on FPGA. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 27(10), 2459\u20132463. https:\/\/doi.org\/10.1109\/TVLSI.2019.2922999","journal-title":"IEEE Transactions on Very Large Scale Integration (VLSI) Systems"},{"key":"10427_CR19","doi-asserted-by":"publisher","first-page":"163419","DOI":"10.1109\/ACCESS.2020.3020262","volume":"8","author":"D Zoni","year":"2020","unstructured":"Zoni, D., Galimberti, A., & Fornaciari, W. (2020). Efficient and scalable FPGA-oriented design of QC-LDPC bit-flipping decoders for post-quantum cryptography. IEEE Access, 8, 163419\u2013163433. https:\/\/doi.org\/10.1109\/ACCESS.2020.3020262","journal-title":"IEEE Access"},{"key":"10427_CR20","doi-asserted-by":"publisher","unstructured":"Andrzejczak, M. (2019). The low-area FPGA design for the post-quantum cryptography proposal Round5. In 2019 Federated Conference on Computer Science and Information Systems (FedCSIS). IEEE. https:\/\/doi.org\/10.15439\/2019F230.","DOI":"10.15439\/2019F230"},{"issue":"3","key":"10427_CR21","doi-asserted-by":"publisher","first-page":"262","DOI":"10.22247\/ijcna\/2022\/212553","volume":"9","author":"M Ganavi","year":"2022","unstructured":"Ganavi, M., Prabhudeva, S., & Nayak, S. N. (2022). A secure image encryption and embedding approach using MRSA and RC6 with DCT transformation. International Journal of Computer Networks and Applications (IJCNA), 9(3), 262\u2013278. https:\/\/doi.org\/10.22247\/ijcna\/2022\/212553","journal-title":"International Journal of Computer Networks and Applications (IJCNA)"},{"issue":"3","key":"10427_CR22","doi-asserted-by":"publisher","first-page":"316","DOI":"10.22247\/ijcna\/2022\/212557","volume":"9","author":"S Silambarasan","year":"2022","unstructured":"Silambarasan, S., & Savitha Devi, M. (2022). Hybrid simulated annealing with Lion Swarm Optimization Algorithm with modified elliptic curve cryptography for secured data transmission over wireless sensor networks (WSN). International Journal of Computer Networks and Applications (IJCNA), 9(3), 316\u2013327. https:\/\/doi.org\/10.22247\/ijcna\/2022\/212557","journal-title":"International Journal of Computer Networks and Applications (IJCNA)"},{"issue":"4","key":"10427_CR23","doi-asserted-by":"publisher","first-page":"288","DOI":"10.22247\/ijcna\/2021\/209697","volume":"8","author":"SS Tyagi","year":"2021","unstructured":"Tyagi, S. S. (2021). Enhancing security of cloud data through encryption with AES and Fernet Algorithm through convolutional-neural-networks (CNN). International Journal of Computer Networks and Applications (IJCNA), 8(4), 288\u2013299. https:\/\/doi.org\/10.22247\/ijcna\/2021\/209697","journal-title":"International Journal of Computer Networks and Applications (IJCNA)"},{"issue":"2","key":"10427_CR24","doi-asserted-by":"publisher","first-page":"160","DOI":"10.22247\/ijcna\/2022\/212332","volume":"9","author":"G Asante","year":"2022","unstructured":"Asante, G., Hayfron-Acquah, J. B., Asante, M., & Dagadu, J. C. (2022). A symmetric, probabilistic, non-circuit based fully homomorphic encryption scheme. International Journal of Computer Networks and Applications (IJCNA), 9(2), 160\u2013168. https:\/\/doi.org\/10.22247\/ijcna\/2022\/212332","journal-title":"International Journal of Computer Networks and Applications (IJCNA)"},{"issue":"1","key":"10427_CR25","doi-asserted-by":"publisher","first-page":"114","DOI":"10.22247\/ijcna\/2022\/211630","volume":"9","author":"M Joseph","year":"2022","unstructured":"Joseph, M., & Mohan, G. (2022). A Novel Algorithm for secured data sharing in cloud using GWOA-DNA cryptography. International Journal of Computer Networks and Applications (IJCNA), 9(1), 114\u2013124. https:\/\/doi.org\/10.22247\/ijcna\/2022\/211630","journal-title":"International Journal of Computer Networks and Applications (IJCNA)"},{"issue":"2","key":"10427_CR26","doi-asserted-by":"publisher","first-page":"214","DOI":"10.22247\/ijcna\/2022\/212337","volume":"9","author":"KMS Khan","year":"2022","unstructured":"Khan, K. M. S., & Nisha, S. S. (2022). BTDEC: blockchain-based trible data elliptic curve cryptosystem with fine-grained access control for personal data. International Journal of Computer Networks and Applications (IJCNA), 9(2), 214\u2013228. https:\/\/doi.org\/10.22247\/ijcna\/2022\/212337","journal-title":"International Journal of Computer Networks and Applications (IJCNA)"},{"key":"10427_CR27","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-021-08566-1","author":"AA Teodoro","year":"2021","unstructured":"Teodoro, A. A., Gomes, O. S., Saadi, M., Silva, B. A., Rosa, R. L., & Rodr\u00edguez, D. Z. (2021). An FPGA-based performance evaluation of artificial neural network architecture algorithm for IoT. Wireless Personal Communications. https:\/\/doi.org\/10.1007\/s11277-021-08566-1","journal-title":"Wireless Personal Communications"},{"key":"10427_CR28","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.vlsi.2020.12.005","volume":"78","author":"Z Chen","year":"2021","unstructured":"Chen, Z., Ma, Y., Chen, T., Lin, J., & Jing, J. (2021). High-performance area-efficient polynomial ring processor for CRYSTALS-kyber on FPGAs. Integration, 78, 25\u201335. https:\/\/doi.org\/10.1016\/j.vlsi.2020.12.005","journal-title":"Integration"},{"issue":"5","key":"10427_CR29","doi-asserted-by":"publisher","first-page":"999","DOI":"10.1109\/TCAD.2020.3019987","volume":"40","author":"AC Canto","year":"2020","unstructured":"Canto, A. C., Kermani, M. M., & Azarderakhsh, R. (2020). Reliable architectures for composite-field-oriented constructions of Mceliece post-quantum cryptography on FPGA. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 40(5), 999\u20131003. https:\/\/doi.org\/10.1109\/TCAD.2020.3019987","journal-title":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"},{"issue":"6","key":"10427_CR30","doi-asserted-by":"publisher","first-page":"950","DOI":"10.1631\/FITEE.1900167","volume":"21","author":"S Takougang Kingni","year":"2020","unstructured":"Takougang Kingni, S., Rajagopal, K., \u00c7i\u00e7ek, S., Srinivasan, A., & Karthikeyan, A. (2020). Dynamic analysis, FPGA implementation, and cryptographic application of an autonomous 5D chaotic system with offset boosting. Frontiers of Information Technology & Electronic Engineering, 21(6), 950\u2013961. https:\/\/doi.org\/10.1631\/FITEE.1900167","journal-title":"Frontiers of Information Technology & Electronic Engineering"},{"key":"10427_CR31","doi-asserted-by":"publisher","first-page":"98649","DOI":"10.1109\/ACCESS.2022.3206785","volume":"10","author":"Z Wang","year":"2022","unstructured":"Wang, Z., Che, B., Guo, L., Du, Y., Chen, Y., & Zhao, J. (2022). PipeFL: hardware\/software co-design of an FPGA accelerator for federated learning. IEEE Access, 10, 98649\u201398661. https:\/\/doi.org\/10.1109\/ACCESS.2022.3206785","journal-title":"IEEE Access"},{"key":"10427_CR32","doi-asserted-by":"publisher","first-page":"7753","DOI":"10.1109\/ACCESS.2022.3143804","volume":"10","author":"I Syafalni","year":"2022","unstructured":"Syafalni, I., Jonatan, G., Sutisna, N., & Mulyawan, R. (2022). Efficient homomorphic encryption accelerator with integrated PRNG using low-cost FPGA. IEEE Access, 10, 7753\u20137771. https:\/\/doi.org\/10.1109\/ACCESS.2022.3143804","journal-title":"IEEE Access"},{"issue":"11","key":"10427_CR33","doi-asserted-by":"publisher","first-page":"2300","DOI":"10.1109\/TVLSI.2020.3017595","volume":"28","author":"D Reis","year":"2020","unstructured":"Reis, D., Takeshita, J., Jung, T., Niemier, M., & Hu, X. S. (2020). Computing-in-memory for performance and energy-efficient homomorphic encryption. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 28(11), 2300\u20132313. https:\/\/doi.org\/10.1109\/TVLSI.2020.3017595","journal-title":"IEEE Transactions on Very Large Scale Integration (VLSI) Systems"},{"issue":"2","key":"10427_CR34","doi-asserted-by":"publisher","first-page":"819","DOI":"10.1109\/TR.2020.3010973","volume":"70","author":"MH Sara\u010devi\u0107","year":"2020","unstructured":"Sara\u010devi\u0107, M. H., Adamovi\u0107, S. Z., Mi\u0161kovic, V. A., Elhoseny, M., Ma\u010dek, N. D., Selim, M. M., & Shankar, K. (2020). Data encryption for Internet of Things applications based on catalan objects and two combinatorial structures. IEEE Transactions on Reliability, 70(2), 819\u2013830. https:\/\/doi.org\/10.1109\/TR.2020.3010973","journal-title":"IEEE Transactions on Reliability"},{"key":"10427_CR35","doi-asserted-by":"publisher","first-page":"113207","DOI":"10.1016\/j.cam.2020.113207","volume":"404","author":"E Defez","year":"2022","unstructured":"Defez, E., Ib\u00e1nez, J., Alonso-Jord\u00e1, P., Alonso, J. M., & Peinado, J. (2022). On Bernoulli matrix polynomials and matrix exponential approximation. Journal of Computational and Applied Mathematics, 404, 113207. https:\/\/doi.org\/10.1016\/j.cam.2020.113207","journal-title":"Journal of Computational and Applied Mathematics"},{"key":"10427_CR36","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2021.03.007","author":"P Prakasam","year":"2022","unstructured":"Prakasam, P., Madheswaran, M., Sujith, K. P., & Sayeed, M. S. (2022). Low latency, area and optimal power hybrid lightweight cryptography authentication scheme for Internet of Things applications. Wireless Personal Communications. https:\/\/doi.org\/10.1016\/j.icte.2021.03.007","journal-title":"Wireless Personal Communications"},{"key":"10427_CR37","doi-asserted-by":"publisher","unstructured":"Kiktenko, E. O., Kudinov, M. A., & Fedorov, A. K. (2019). Detecting brute-force attacks on cryptocurrency wallets. In International Conference on Business Information Systems. Springer. https:\/\/doi.org\/10.1007\/978-3-030-36691-9_20.","DOI":"10.1007\/978-3-030-36691-9_20"},{"issue":"13&14","key":"10427_CR38","doi-asserted-by":"publisher","first-page":"1132","DOI":"10.26421\/QIC22.13-14-3","volume":"22","author":"A Jagielski","year":"2022","unstructured":"Jagielski, A., & Kanciak, K. (2022). Quantum resource estimation for a NIST LWC call finalist. Quantum Information and Computation, 22(13&14), 1132\u20131143.","journal-title":"Quantum Information and Computation"},{"issue":"3","key":"10427_CR39","doi-asserted-by":"publisher","first-page":"494","DOI":"10.3390\/app9030494","volume":"9","author":"M Li","year":"2019","unstructured":"Li, M., Zhou, K., Ren, H., & Fan, H. (2019). Cryptanalysis of permutation\u2013diffusion-based lightweight chaotic image encryption scheme using CPA. Applied Sciences, 9(3), 494. https:\/\/doi.org\/10.3390\/app9030494","journal-title":"Applied Sciences"},{"key":"10427_CR40","doi-asserted-by":"publisher","unstructured":"Thomas, J., Cherian, S., & Chandran, S. (2020). Man in the middle attack mitigation in LoRaWAN. In 2020 International Conference on Inventive Computation Technologies (ICICT). IEEE. https:\/\/doi.org\/10.1109\/ICICT48043.2020.9112391.","DOI":"10.1109\/ICICT48043.2020.9112391"},{"key":"10427_CR41","doi-asserted-by":"publisher","first-page":"106454","DOI":"10.1016\/j.optlaseng.2020.106454","volume":"138","author":"H Wu","year":"2021","unstructured":"Wu, H., Meng, X., Yang, X., Li, X., Wang, P., & He, W. (2021). Ciphertext-only attack on optical cryptosystem with spatially incoherent illumination based deep-learning correlography. Optics and Lasers in Engineering, 138, 106454. https:\/\/doi.org\/10.1016\/j.optlaseng.2020.106454","journal-title":"Optics and Lasers in Engineering"}],"updated-by":[{"DOI":"10.1007\/s11277-023-10503-3","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2023,5,17]],"date-time":"2023-05-17T00:00:00Z","timestamp":1684281600000}}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-023-10427-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-023-10427-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-023-10427-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,26]],"date-time":"2023-06-26T13:44:02Z","timestamp":1687787042000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-023-10427-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,28]]},"references-count":41,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,7]]}},"alternative-id":["10427"],"URL":"https:\/\/doi.org\/10.1007\/s11277-023-10427-y","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-1699401\/v1","asserted-by":"object"}]},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,4,28]]},"assertion":[{"value":"6 April 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 April 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 May 2023","order":3,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":4,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The original version of this article was revised: In this article the affiliation details for author D. Ajitha were incorrectly given as \u2018Department of Electronics and Communication Engineering, School of Computer Science and Engineering (SCOPE), VIT, Vellore, Tamil Nadu, India\u2019 but should have been \u2018Department of Software Systems, School of Computer Science and Engineering (SCOPE), Vellore Institue of Technology, Vellore, Tamil Nadu, India\u2019.","order":5,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 May 2023","order":6,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":7,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"A Correction to this paper has been published:","order":8,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"https:\/\/doi.org\/10.1007\/s11277-023-10503-3","URL":"https:\/\/doi.org\/10.1007\/s11277-023-10503-3","order":9,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no potential conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}},{"value":"All applicable institutional and\/or national guidelines for the care and use of animals were followed.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"For this type of study formal consent is not required.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed Consent"}}]}}