{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T16:51:02Z","timestamp":1773247862395,"version":"3.50.1"},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"1-2","license":[{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1007\/s11277-025-11847-8","type":"journal-article","created":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T16:07:41Z","timestamp":1761667661000},"page":"205-230","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["LB-RFID: Provably Secure Post-quantum Authentication Protocol for RFID Devices in Resource-constrained IoT Environment"],"prefix":"10.1007","volume":"144","author":[{"given":"Lacchita","family":"Soni","sequence":"first","affiliation":[]},{"given":"Harish","family":"Chandra","sequence":"additional","affiliation":[]},{"given":"Daya Sagar","family":"Gupta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,28]]},"reference":[{"issue":"3","key":"11847_CR1","doi-asserted-by":"publisher","first-page":"3255","DOI":"10.1109\/TVT.2022.3144785","volume":"71","author":"DS Gupta","year":"2022","unstructured":"Gupta, D. S., Karati, A., Saad, W., & Costa, D. B. (2022). Quantum-defended blockchain-assisted data authentication protocol for internet of vehicles. IEEE Transactions on Vehicular Technology, 71(3), 3255\u20133266.","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"7","key":"11847_CR2","doi-asserted-by":"publisher","first-page":"155014771986222","DOI":"10.1177\/1550147719862223","volume":"15","author":"Z-Y Wu","year":"2019","unstructured":"Wu, Z.-Y. (2019). An radio-frequency identification security authentication mechanism for internet of things applications. International Journal of Distributed Sensor Networks, 15(7), 1550147719862223.","journal-title":"International Journal of Distributed Sensor Networks"},{"issue":"3","key":"11847_CR3","doi-asserted-by":"publisher","first-page":"3620","DOI":"10.1109\/JSYST.2020.3016065","volume":"15","author":"DS Gupta","year":"2020","unstructured":"Gupta, D. S., Islam, S. H., Obaidat, M. S., Karati, A., & Sadoun, B. (2020). Laac: Lightweight lattice-based authentication and access control protocol for e-health systems in iot environments. IEEE Systems Journal, 15(3), 3620\u20133627.","journal-title":"IEEE Systems Journal"},{"key":"11847_CR4","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1016\/j.procs.2016.02.017","volume":"78","author":"P Dass","year":"2016","unstructured":"Dass, P., & Om, H. (2016). A secure authentication scheme for RFID systems. Procedia Computer Science, 78, 100\u2013106.","journal-title":"Procedia Computer Science"},{"key":"11847_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.103053","volume":"64","author":"S Akleylek","year":"2022","unstructured":"Akleylek, S., & Soysald\u0131, M. (2022). A new lattice-based authentication scheme for IoT. Journal of Information Security and Applications, 64, Article 103053.","journal-title":"Journal of Information Security and Applications"},{"key":"11847_CR6","doi-asserted-by":"publisher","first-page":"49942","DOI":"10.1109\/ACCESS.2021.3069429","volume":"9","author":"U Ali","year":"2021","unstructured":"Ali, U., Idris, M. Y. I. B., Ayub, M. N. B., Ullah, I., Ali, I., Nandy, T., Yahuza, M., & Khan, N. (2021). Rfid authentication scheme based on hyperelliptic curve signcryption. IEEE Access, 9, 49942\u201349959.","journal-title":"IEEE Access"},{"key":"11847_CR7","doi-asserted-by":"crossref","unstructured":"Pelzl, J., Wollinger, T., Guajardo, J., & Paar, C. (2003). Hyperelliptic curve cryptosystems: Closing the performance gap to elliptic curves. In Cryptographic Hardware and Embedded Systems-CHES 2003: 5th International Workshop, September 8\u201310, 2003. Proceedings 5, (pp. 351\u2013365). Cologne, Germany: Springer.","DOI":"10.1007\/978-3-540-45238-6_28"},{"issue":"1","key":"11847_CR8","first-page":"344","volume":"14","author":"AK Singh","year":"2020","unstructured":"Singh, A. K., & Patro, B. (2020). Elliptic curve signcryption based security protocol for RFID. KSII Transactions on Internet and Information Systems, 14(1), 344\u2013365.","journal-title":"KSII Transactions on Internet and Information Systems"},{"issue":"6","key":"11847_CR9","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-023-02220-2","volume":"4","author":"H Timouhin","year":"2023","unstructured":"Timouhin, H., Amounas, F., & Azrour, M. (2023). New ECC-based IoT authentication protocol for securing RFID systems. SN Computer Science, 4(6), Article 785.","journal-title":"SN Computer Science"},{"key":"11847_CR10","doi-asserted-by":"crossref","unstructured":"Alamr, A. A., Kausar, F., & Kim, J. S. (2016). Secure mutual authentication protocol for rfid based on elliptic curve cryptography. In 2016 International Conference on Platform Technology and Service (PlatCon), (pp. 1\u20137). IEEE.","DOI":"10.1109\/PlatCon.2016.7456822"},{"issue":"1","key":"11847_CR11","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1007\/s11276-017-1565-3","volume":"25","author":"N Dinarvand","year":"2019","unstructured":"Dinarvand, N., & Barati, H. (2019). An efficient and secure RFID authentication protocol using elliptic curve cryptography. Wireless Networks, 25(1), 415\u2013428.","journal-title":"Wireless Networks"},{"key":"11847_CR12","doi-asserted-by":"crossref","unstructured":"Zheng, L., Xue, Y., Zhang, L., & Zhang, R. (2017). Mutual authentication protocol for rfid based on ecc. In 2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), (vol. 2, pp. 320\u2013323). IEEE.","DOI":"10.1109\/CSE-EUC.2017.245"},{"issue":"3","key":"11847_CR13","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3473","volume":"31","author":"DS Gupta","year":"2018","unstructured":"Gupta, D. S., & Biswas, G. (2018). A novel and efficient lattice-based authenticated key exchange protocol in c-k model. International Journal of Communication Systems, 31(3), Article 3473.","journal-title":"International Journal of Communication Systems"},{"issue":"6","key":"11847_CR14","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3255","volume":"29","author":"DS Gupta","year":"2018","unstructured":"Gupta, D. S., & Biswas, G. (2018). Design of lattice-based elgamal encryption and signature schemes using sis problem. Transactions on Emerging Telecommunications Technologies, 29(6), Article 3255.","journal-title":"Transactions on Emerging Telecommunications Technologies"},{"key":"11847_CR15","doi-asserted-by":"publisher","first-page":"1763","DOI":"10.1007\/s00607-018-0689-3","volume":"101","author":"S Mukherjee","year":"2019","unstructured":"Mukherjee, S., Gupta, D. S., & Biswas, G. (2019). An efficient and batch verifiable conditional privacy-preserving authentication scheme for vanets using lattice. Computing, 101, 1763\u20131788.","journal-title":"Computing"},{"issue":"1","key":"11847_CR16","first-page":"1","volume":"27","author":"L Soni","year":"2022","unstructured":"Soni, L., Chandra, H., Gupta, D. S., & Keval, R. (2022). Quantum-resistant public-key encryption and signature schemes with smaller key sizes. Cluster Computing, 27(1), 1\u201313.","journal-title":"Cluster Computing"},{"issue":"2","key":"11847_CR17","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1137\/S0036144598347011","volume":"41","author":"PW Shor","year":"1999","unstructured":"Shor, P. W. (1999). Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Review, 41(2), 303\u2013332.","journal-title":"SIAM Review"},{"issue":"1","key":"11847_CR18","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1109\/JSYST.2023.3335217","volume":"18","author":"DS Gupta","year":"2023","unstructured":"Gupta, D. S. (2023). Pilike: Post-quantum identity-based lightweight authenticated key exchange protocol for IIOT environments. IEEE Systems Journal, 18(1), 15\u201323.","journal-title":"IEEE Systems Journal"},{"key":"11847_CR19","doi-asserted-by":"crossref","unstructured":"Gupta, D. S. (2022). A mutual authentication and key agreement protocol for smart grid environment using lattice. In Proceedings of the International Conference on Computational Intelligence and Sustainable Technologies: ICoCIST 2021, (pp. 239\u2013248). Springer.","DOI":"10.1007\/978-981-16-6893-7_22"},{"key":"11847_CR20","doi-asserted-by":"crossref","unstructured":"G\u00f3dor, G., Giczi, N., & Imre, S. (2010). Elliptic curve cryptography based mutual authentication protocol for low computational capacity rfid systems-performance analysis by simulations. In 2010 IEEE International Conference on Wireless Communications, Networking and Information Security, (pp. 650\u2013657). IEEE.","DOI":"10.1109\/WCINS.2010.5541860"},{"key":"11847_CR21","doi-asserted-by":"crossref","unstructured":"Lee, Y. K., Batina, L., Singelee, D., Preneel, B., & Verbauwhede, I. (2010). Anti-counterfeiting, untraceability and other security challenges for rfid systems: Public-key-based protocols and hardware. Towards Hardware-Intrinsic Security: Foundations and Practice, 237\u2013257.","DOI":"10.1007\/978-3-642-14452-3_11"},{"key":"11847_CR22","doi-asserted-by":"crossref","unstructured":"Safkhani, M., Bagheri, N., Naderi, M., Luo, Y., & Chai, Q. (2011). Tag impersonation attack on two rfid mutual authentication protocols. In 2011 Sixth International Conference on Availability, Reliability and Security, (pp. 581\u2013584). IEEE.","DOI":"10.1109\/ARES.2011.87"},{"key":"11847_CR23","unstructured":"Safkhani, M., Peris-Lopez, P., Hernandez-Castro, J. C., Bagheri, N., & Naderi, M. (2011). Cryptanalysis of cho$$\\backslash$$textit $$\\{$$et al.$$\\}$$\u2019s protocol, a hash-based mutual authentication protocol for rfid systems. Cryptology ePrint Archive."},{"issue":"4","key":"11847_CR24","doi-asserted-by":"publisher","first-page":"363","DOI":"10.5405\/jmbe.1276","volume":"33","author":"P Peris-Lopez","year":"2013","unstructured":"Peris-Lopez, P., Safkhani, M., Bagheri, N., & Naderi, M. (2013). Rfid in ehealth: How to combat medication errors and strengthen patient safety. Journal Medical Biological Engineering, 33(4), 363\u2013372.","journal-title":"Journal Medical Biological Engineering"},{"issue":"11","key":"11847_CR25","doi-asserted-by":"publisher","first-page":"2880","DOI":"10.4304\/jcp.8.11.2880-2887","volume":"8","author":"Y-L Liu","year":"2013","unstructured":"Liu, Y.-L., Qin, X., Wang, C., & Li, B. (2013). A lightweight RFID authentication protocol based on elliptic curve cryptography. Journal Of Computers, 8(11), 2880\u20132887.","journal-title":"Journal Of Computers"},{"key":"11847_CR26","doi-asserted-by":"crossref","unstructured":"Liao, Y.-P., & Hsiao, C.-M. (2013). A secure ecc-based rfid authentication scheme using hybrid protocols. In Advances in Intelligent Systems and Applications-Volume 2: Proceedings of the International Computer Symposium ICS 2012 Held at Hualien, December 12\u201314, 2012, (pp. 1\u201313). Taiwan: Springer.","DOI":"10.1007\/978-3-642-35473-1_1"},{"key":"11847_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-014-0046-9","volume":"38","author":"Z Zhao","year":"2014","unstructured":"Zhao, Z. (2014). A secure RFID authentication protocol for healthcare environments using elliptic curve cryptosystem. Journal of Medical Systems, 38, 1\u20137.","journal-title":"Journal of Medical Systems"},{"key":"11847_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-016-0521-6","volume":"40","author":"MS Farash","year":"2016","unstructured":"Farash, M. S., Nawaz, O., Mahmood, K., Chaudhry, S. A., & Khan, M. K. (2016). A provably secure RFID authentication protocol based on elliptic curve for healthcare environments. Journal of Medical Systems, 40, 1\u20137.","journal-title":"Journal of Medical Systems"},{"key":"11847_CR29","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/s11227-013-1073-x","volume":"70","author":"J-S Chou","year":"2014","unstructured":"Chou, J.-S. (2014). An efficient mutual authentication RFID scheme based on elliptic curve cryptography. The Journal of Supercomputing, 70, 75\u201394.","journal-title":"The Journal of Supercomputing"},{"key":"11847_CR30","doi-asserted-by":"crossref","unstructured":"Feng, L., & Yao, X. (2015). Rfid system mutual authentication protocols based on ecc. In 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), (pp. 1644\u20131649). IEEE.","DOI":"10.1109\/UIC-ATC-ScalCom-CBDCom-IoP.2015.299"},{"key":"11847_CR31","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/s10660-014-9165-0","volume":"15","author":"Y Chen","year":"2015","unstructured":"Chen, Y., & Chou, J.-S. (2015). ECC-based untraceable authentication for large-scale active-tag RFID systems. Electronic Commerce Research, 15, 97\u2013120.","journal-title":"Electronic Commerce Research"},{"key":"11847_CR32","unstructured":"Chen, Y., & Chou, J.-S. (2014) Cryptanalysis on \u201csecure untraceable off-line electronic cash system\u201d. Cryptology ePrint Archive."},{"key":"11847_CR33","doi-asserted-by":"publisher","first-page":"5253","DOI":"10.1007\/s11277-016-3739-1","volume":"96","author":"H Shen","year":"2017","unstructured":"Shen, H., Shen, J., Khan, M. K., & Lee, J.-H. (2017). Efficient RFID authentication using elliptic curve cryptography for the internet of things. Wireless Personal Communications, 96, 5253\u20135266.","journal-title":"Wireless Personal Communications"},{"issue":"2","key":"11847_CR34","first-page":"354","volume":"18","author":"Q Qian","year":"2016","unstructured":"Qian, Q., Jia, Y.-L., & Zhang, R. (2016). A lightweight RFID security protocol based on elliptic curve crytography. International Journal of Networking and Security, 18(2), 354\u2013361.","journal-title":"International Journal of Networking and Security"},{"issue":"3","key":"11847_CR35","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2975","volume":"30","author":"N Bagheri","year":"2017","unstructured":"Bagheri, N., Alenaby, P., & Safkhani, M. (2017). A new anti-collision protocol based on information of collided tags in RFID systems. International Journal of Communication Systems, 30(3), Article 2975.","journal-title":"International Journal of Communication Systems"},{"issue":"2","key":"11847_CR36","first-page":"396","volume":"20","author":"S-Y Chiou","year":"2018","unstructured":"Chiou, S.-Y., Ko, W.-T., & Lu, E.-H. (2018). A secure ECC-based mobile RFID mutual authentication protocol and its application. International Journal of Networking and Security, 20(2), 396\u2013402.","journal-title":"International Journal of Networking and Security"},{"key":"11847_CR37","doi-asserted-by":"publisher","first-page":"1445","DOI":"10.1007\/s11277-018-5771-9","volume":"101","author":"G Liu","year":"2018","unstructured":"Liu, G., Zhang, H., Kong, F., & Zhang, L. (2018). A novel authentication management RFID protocol based on elliptic curve cryptography. Wireless Personal Communications, 101, 1445\u20131455.","journal-title":"Wireless Personal Communications"},{"issue":"4","key":"11847_CR38","doi-asserted-by":"publisher","first-page":"1656","DOI":"10.1109\/TII.2018.2794996","volume":"14","author":"K Fan","year":"2018","unstructured":"Fan, K., Jiang, W., Li, H., & Yang, Y. (2018). Lightweight RFID protocol for medical privacy protection in IoT. IEEE Transactions on Industrial Informatics, 14(4), 1656\u20131665.","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"3","key":"11847_CR39","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3837","volume":"32","author":"SF Aghili","year":"2019","unstructured":"Aghili, S. F., & Mala, H. (2019). Security analysis of an ultra-lightweight RFID authentication protocol for m-commerce. International Journal of Communication Systems, 32(3), Article 3837.","journal-title":"International Journal of Communication Systems"},{"issue":"3","key":"11847_CR40","doi-asserted-by":"publisher","first-page":"2513","DOI":"10.1007\/s11277-020-07992-x","volume":"117","author":"M Benssalah","year":"2021","unstructured":"Benssalah, M., Sarah, I., & Drouiche, K. (2021). An efficient RFID authentication scheme based on elliptic curve cryptography for internet of things. Wireless Personal Communications, 117(3), 2513\u20132539.","journal-title":"Wireless Personal Communications"},{"issue":"1","key":"11847_CR41","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1186\/s13638-022-02146-y","volume":"2022","author":"D Noori","year":"2022","unstructured":"Noori, D., Shakeri, H., & Niazi Torshiz, M. (2022). An elliptic curve cryptosystem-based secure RFID mutual authentication for internet of things in healthcare environment. EURASIP Journal on Wireless Communications and Networking, 2022(1), 64.","journal-title":"EURASIP Journal on Wireless Communications and Networking"},{"issue":"2","key":"11847_CR42","doi-asserted-by":"publisher","first-page":"190","DOI":"10.6633\/IJNS.20240326(2).04","volume":"26","author":"T Pan","year":"2024","unstructured":"Pan, T., Zuo, K. .-Z., Wang, T.-C., & Deng, C.-H. (2024). A lightweight authentication protocol for mobile rfid. International Journal of Network Security, 26(2), 190\u2013199. https:\/\/doi.org\/10.6633\/IJNS.20240326(2).04","journal-title":"International Journal of Network Security"},{"key":"11847_CR43","doi-asserted-by":"publisher","first-page":"729","DOI":"10.5486\/PMD.2011.5311","volume":"79","author":"R Silva","year":"2011","unstructured":"Silva, R., Cayrel, P.-L., & Buchmann, J. (2011). Post-quantum cryptography: Lattice identification schemes. Publicationes Mathematicae Debrecen, 79, 729\u2013748.","journal-title":"Publicationes Mathematicae Debrecen"},{"issue":"3","key":"11847_CR44","first-page":"1900","volume":"9","author":"V Odelu","year":"2016","unstructured":"Odelu, V., Das, A. K., Wazid, M., & Conti, M. (2016). Provably secure authenticated key agreement scheme for smart grid. IEEE Transactions on Smart Grid, 9(3), 1900\u20131910.","journal-title":"IEEE Transactions on Smart Grid"},{"key":"11847_CR45","unstructured":"Shoup, V. (2004). Sequences of games: a tool for taming complexity in security proofs. Cryptology Eprint Archive."},{"key":"11847_CR46","doi-asserted-by":"crossref","unstructured":"Cremers, C. J., Lafourcade, P., & Nadeau, P. (2009). Comparing state spaces in automatic security protocol analysis. Formal to Practical Security: Papers Issued from the 2005-2008 French-Japanese Collaboration, 70\u201394.","DOI":"10.1007\/978-3-642-02002-5_5"},{"key":"11847_CR47","unstructured":"Cremers, C. J. F. (2006). Scyther: Semantics and verification of security protocols."},{"key":"11847_CR48","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/j.comcom.2021.09.031","volume":"181","author":"DS Gupta","year":"2022","unstructured":"Gupta, D. S., Ray, S., Singh, T., & Kumari, M. (2022). Post-quantum lightweight identity-based two-party authenticated key exchange protocol for internet of vehicles with probable security. Computer Communications, 181, 69\u201379.","journal-title":"Computer Communications"},{"issue":"5","key":"11847_CR49","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s12652-022-04370-2","volume":"14","author":"DS Gupta","year":"2023","unstructured":"Gupta, D. S., Mazumdar, N., Nag, A., & Singh, J. P. (2023). Secure data authentication and access control protocol for industrial healthcare system. Journal of Ambient Intelligence and Humanized Computing, 14(5), 1.","journal-title":"Journal of Ambient Intelligence and Humanized Computing"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-025-11847-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-025-11847-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-025-11847-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T09:18:37Z","timestamp":1763371117000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-025-11847-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9]]},"references-count":49,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[2025,9]]}},"alternative-id":["11847"],"URL":"https:\/\/doi.org\/10.1007\/s11277-025-11847-8","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9]]},"assertion":[{"value":"1 August 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 October 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 October 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Code availability"}}]}}