{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,6,30]],"date-time":"2023-06-30T09:12:52Z","timestamp":1688116372508},"reference-count":58,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2013,3,14]],"date-time":"2013-03-14T00:00:00Z","timestamp":1363219200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Front. Comput. Sci."],"published-print":{"date-parts":[[2013,4]]},"DOI":"10.1007\/s11704-013-1268-6","type":"journal-article","created":{"date-parts":[[2013,3,14]],"date-time":"2013-03-14T16:09:59Z","timestamp":1363277399000},"page":"279-297","source":"Crossref","is-referenced-by-count":6,"title":["Design and formal verification of a CEM protocol with transparent TTP"],"prefix":"10.1007","volume":"7","author":[{"given":"Zhiyuan","family":"Liu","sequence":"first","affiliation":[]},{"given":"Jun","family":"Pang","sequence":"additional","affiliation":[]},{"given":"Chenyi","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,3,14]]},"reference":[{"issue":"1","key":"1268_CR1","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1145\/1456650.1456655","volume":"41","author":"J Onieva","year":"2008","unstructured":"Onieva J, Zhou J, Lopez J. Multiparty nonrepudiation: a survey. ACM Computing Surveys (CSUR), 2008, 41(1): 5","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"1268_CR2","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1145\/266420.266426","volume-title":"Proceedings of the 4th ACM conference on Computer and Communications Security","author":"N Asokan","year":"1997","unstructured":"Asokan N, Schunter M, Waidner M. Optimistic protocols for fair exchange. In: Proceedings of the 4th ACM conference on Computer and Communications Security. 1997, 7\u201317"},{"issue":"2","key":"1268_CR3","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev D, Yao A. On the security of public key protocols. IEEE Transactions on Information Theory, 1983, 29(2): 198\u2013208","journal-title":"IEEE Transactions on Information Theory"},{"key":"1268_CR4","first-page":"551","volume-title":"Proceedings of the 12th International Conference on Concurrency Theory","author":"S Kremer","year":"2001","unstructured":"Kremer S, Raskin J. A game-based verification of non-repudiation and fair exchange protocols. In: Proceedings of the 12th International Conference on Concurrency Theory. 2001, 551\u2013565"},{"issue":"8","key":"1268_CR5","doi-asserted-by":"crossref","first-page":"1045","DOI":"10.1016\/j.ins.2005.01.016","volume":"176","author":"B Anderson","year":"2006","unstructured":"Anderson B, Hansen J, Lowry P, Summers S. Standards and verification for fair-exchange and atomicity in e-commerce transactions. Information Sciences, 2006, 176(8): 1045\u20131066","journal-title":"Information Sciences"},{"issue":"1","key":"1268_CR6","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1007\/s10817-005-9019-5","volume":"36","author":"R Chadha","year":"2006","unstructured":"Chadha R, Kremer S, Scedrov A. Formal analysis of multiparty contract signing. Journal of Automated Reasoning, 2006, 36(1): 39\u201383","journal-title":"Journal of Automated Reasoning"},{"key":"1268_CR7","first-page":"186","volume-title":"Proceedings of the 6th International Conference on Formal Aspects in Security and Trust","author":"Y Zhang","year":"2009","unstructured":"Zhang Y, Zhang C, Pang J, Mauw S. Game-based verification of multiparty contract signing protocols. In: Proceedings of the 6th International Conference on Formal Aspects in Security and Trust. 2009, 186\u2013200"},{"key":"1268_CR8","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1007\/978-3-642-17650-0_18","volume-title":"Proceedings of the 12th International Conference on Information and Communications Security","author":"M Chen","year":"2010","unstructured":"Chen M, Wu K, Xu J, He P. A new method for formalizing optimistic fair exchange protocols. In: Proceedings of the 12th International Conference on Information and Communications Security. 2010, 251\u2013265"},{"key":"1268_CR9","first-page":"1","volume-title":"Proceedings of the 4th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","author":"T Gaber","year":"2011","unstructured":"Gaber T, Zhang N. Fair and abuse-free contract signing protocol supporting fair license reselling. In: Proceedings of the 4th IFIP International Conference on New Technologies, Mobility and Security (NTMS). 2011, 1\u20137"},{"key":"1268_CR10","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1007\/978-3-642-27940-9_11","volume-title":"Proceedings of the 13th International Conference on Verification, Model Checking, and Abstract Interpretation","author":"K Chatterjee","year":"2012","unstructured":"Chatterjee K, Raman V. Synthesizing protocols for digital contract signing. In: Proceedings of the 13th International Conference on Verification, Model Checking, and Abstract Interpretation. 2012, 152\u2013168"},{"key":"1268_CR11","first-page":"168","volume":"2012","author":"D Williams","year":"2012","unstructured":"Williams D, Ruiterd J, Fokkink W. Model checking under fairness in prob and its application to fair exchange protocols. Theoretical Aspects of Computing-ICTAC 2012, 2012, 168\u2013182","journal-title":"Theoretical Aspects of Computing-ICTAC"},{"issue":"2","key":"1268_CR12","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1007\/s11334-012-0180-9","volume":"8","author":"Y Zhang","year":"2012","unstructured":"Zhang Y, Zhang C, Pang J, Mauw S. Game-based verification of contract signing protocols with minimal messages. Innovations in Systems and Software Engineering, 2012, 8(2): 111\u2013124","journal-title":"Innovations in Systems and Software Engineering"},{"key":"1268_CR13","volume-title":"Proceedings of the RSA Security Conference","author":"S Micali","year":"1997","unstructured":"Micali S. Certified email with invisible post offices. In: Proceedings of the RSA Security Conference. 1997"},{"key":"1268_CR14","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1007\/3-540-45439-X_25","volume-title":"Proceedings of the 4th International Conference on Information Security","author":"O Markowitch","year":"2001","unstructured":"Markowitch O, Kremer S. An optimistic non-repudiation protocol with transparent trusted third party. In: Proceedings of the 4th International Conference on Information Security. 2001, 363\u2013378"},{"key":"1268_CR15","first-page":"326","volume-title":"Proceedings of the 3rd International Conference on Cryptology: Progress in Cryptology","author":"K Imamoto","year":"2002","unstructured":"Imamoto K, Sakurai K. A certified e-mail system with receiver\u2019s selective usage of delivery authority. In: Proceedings of the 3rd International Conference on Cryptology: Progress in Cryptology. 2002, 326\u2013338"},{"key":"1268_CR16","first-page":"182","volume-title":"Proceedings of the Cryptographer\u2019s Track at the RSA Conference on Topics in Cryptology","author":"G Ateniese","year":"2002","unstructured":"Ateniese G, Nita-Rotaru C. Stateless-recipient certified e-mail system based on verifiable encryption. In: Proceedings of the Cryptographer\u2019s Track at the RSA Conference on Topics in Cryptology. 2002, 182\u2013199"},{"key":"1268_CR17","first-page":"12","volume-title":"Proceedings of the 22nd Annual ACM Symposium on Principles of Distributed Computing","author":"S Micali","year":"2003","unstructured":"Micali S. Simple and fast optimistic protocols for fair electronic exchange. In: Proceedings of the 22nd Annual ACM Symposium on Principles of Distributed Computing. 2003, 12\u201319"},{"key":"1268_CR18","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1145\/967900.967985","volume-title":"Proceedings of the 2004 ACM Symposium on Applied Computing","author":"A Nenadi\u0107","year":"2004","unstructured":"Nenadi\u0107 A, Zhang N, Barton S. Fair certified e-mail delivery. In: Proceedings of the 2004 ACM Symposium on Applied Computing. 2004, 391\u2013396"},{"issue":"5","key":"1268_CR19","doi-asserted-by":"crossref","first-page":"441","DOI":"10.3233\/JCS-2006-14504","volume":"14","author":"G Wang","year":"2006","unstructured":"Wang G. Generic non-repudiation protocols supporting transparent off-line TTP. Journal of Computer Security, 2006, 14(5): 441\u2013467","journal-title":"Journal of Computer Security"},{"issue":"4","key":"1268_CR20","doi-asserted-by":"crossref","first-page":"467","DOI":"10.1016\/j.csi.2005.03.002","volume":"28","author":"C Ma","year":"2006","unstructured":"Ma C, Li S, Chen K, Liu S. Analysis and improvement of fair certified e-mail delivery protocol. Computer Standards & Interfaces, 2006, 28(4): 467\u2013474","journal-title":"Computer Standards & Interfaces"},{"issue":"3","key":"1268_CR21","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1016\/j.csi.2007.08.003","volume":"30","author":"X Liang","year":"2008","unstructured":"Liang X, Cao Z, Lu R, Qin L. Efficient and secure protocol in fair document exchange. Computer Standards & Interfaces, 2008, 30(3): 167\u2013176","journal-title":"Computer Standards & Interfaces"},{"key":"1268_CR22","first-page":"1385","volume":"5","author":"R Hwang","year":"2008","unstructured":"Hwang R, Lai C. Efficient and secure protocol in fair e-mail delivery. WSEAS Transactions on Information Science and Applications, 2008, 5: 1385\u20131394","journal-title":"WSEAS Transactions on Information Science and Applications"},{"key":"1268_CR23","first-page":"525","volume-title":"Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops","author":"J Cederquist","year":"2007","unstructured":"Cederquist J, Dashti M, Mauw S. A certified email protocol using key chains. In: Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops. 2007, 525\u2013530"},{"key":"1268_CR24","first-page":"71","volume-title":"Proceedings of the 5th Conference on Cryptology in India","author":"F Zhang","year":"2003","unstructured":"Zhang F, Safavi-Naini R, Susilo W. Efficient verifiably encrypted signature and partially blind signature from bilinear pairings. In: Proceedings of the 5th Conference on Cryptology in India. 2003, 71\u201384"},{"key":"1268_CR25","doi-asserted-by":"crossref","first-page":"521","DOI":"10.1007\/BFb0028774","volume-title":"Computer Aided Verification","author":"R Alur","year":"1998","unstructured":"Alur R, Henzinger T, Mang F, Qadeer S, Rajamani S, Tasiran S. MOCHA: Modularity in model checking. Computer Aided Verification, 1998, 521\u2013525"},{"issue":"5","key":"1268_CR26","doi-asserted-by":"crossref","first-page":"672","DOI":"10.1145\/585265.585270","volume":"49","author":"R Alur","year":"2002","unstructured":"Alur R, Henzinger T, Kupferman O. Alternating-time temporal logic. Journal of the ACM, 2002, 49(5): 672\u2013713","journal-title":"Journal of the ACM"},{"key":"1268_CR27","doi-asserted-by":"crossref","first-page":"250","DOI":"10.1007\/3-540-44585-4_23","volume-title":"Proceedings of the 13th International Conference on Computer Aided Verification","author":"S Blom","year":"2001","unstructured":"Blom S, Fokkink W, Groote J, Langevelde I, Lisser B, Pol J. \u00b5CRL: a toolset for analysing algebraic specifications. In: Proceedings of the 13th International Conference on Computer Aided Verification. 2001, 250\u2013254"},{"key":"1268_CR28","doi-asserted-by":"crossref","first-page":"683","DOI":"10.1007\/978-3-540-71209-1_53","volume":"4424","author":"S Blom","year":"2007","unstructured":"Blom S, Calam\u00e9 J, Lisser B, Orzan S, Pang J, Van De Pol J, Dashti M, Wijs A. Distributed analysis with \u00b5 CRL: a compendium of case studies. Tools and Algorithms for the Construction and Analysis of Systems, 2007, 4424: 683\u2013689","journal-title":"Tools and Algorithms for the Construction and Analysis of Systems"},{"key":"1268_CR29","doi-asserted-by":"crossref","first-page":"437","DOI":"10.1007\/3-540-61474-5_97","volume-title":"Computer Aided Verification","author":"J Fernandez","year":"1996","unstructured":"Fernandez J, Garavel H, Kerbrat A, Mounier L, Mateescu R, Sighireanu M. CADP a protocol validation and verification toolbox. Computer Aided Verification, 1996, 437\u2013440"},{"key":"1268_CR30","first-page":"630","volume-title":"Proceedings of the 8th IEEE\/IFIP International Conference on Embedded and Ubiquitous Computing (EUC)","author":"Z Liu","year":"2010","unstructured":"Liu Z, Pang J, Zhang C. Extending a key-chain based certified email protocol with transparent TTP. In: Proceedings of the 8th IEEE\/IFIP International Conference on Embedded and Ubiquitous Computing (EUC). 2010, 630\u2013636"},{"key":"1268_CR31","first-page":"51","volume-title":"Proceedings of the 3rdWorkshop on Harnessing Theories for Tool Support in Software","author":"Z Liu","year":"2011","unstructured":"Liu Z, Pang J, Zhang C. Verification of a key-chain based TTP transparent CEMprotocol. In: Proceedings of the 3rdWorkshop on Harnessing Theories for Tool Support in Software. 2011, 51\u201365"},{"issue":"4","key":"1268_CR32","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1007\/s10207-004-0063-7","volume":"4","author":"S G\u00fcrgens","year":"2003","unstructured":"G\u00fcrgens S, Rudolph C, Vogt H. On the security of fair non-repudiation protocols. Information Security, 2003, 4(4): 253\u2013262","journal-title":"Information Security"},{"key":"1268_CR33","first-page":"591","volume":"18","author":"N Asokan","year":"1998","unstructured":"Asokan N, Shoup V, Waidner M. Optimistic fair exchange of digital signatures. IEEE Journal an Selected Areas in Communications, 1998, 18: 591\u2013606","journal-title":"IEEE Journal an Selected Areas in Communications"},{"key":"1268_CR34","first-page":"77","volume-title":"Proceedings the 1998 IEEE Symposium on Security and Privacy","author":"F Bao","year":"1998","unstructured":"Bao F, Deng R, Mao W. Efficient and practical fair exchange protocols with off-line ttp. In: Proceedings the 1998 IEEE Symposium on Security and Privacy. 1998, 77\u201385"},{"key":"1268_CR35","first-page":"271","volume-title":"Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology","author":"C Boyd","year":"1998","unstructured":"Boyd C, Foo E. Off-line fair payment protocols using convertible signatures. In: Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology. 1998, 271\u2013285"},{"key":"1268_CR36","first-page":"331","volume-title":"Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology","author":"J Camenisch","year":"2000","unstructured":"Camenisch J, Damg\u00e5rd I. Verifiable encryption, group encryption, and their applications to separable group signatures and signature sharing schemes. In: Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology. 2000, 331\u2013345"},{"key":"1268_CR37","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1007\/978-3-540-30144-8_5","volume-title":"Proceedings of the 4th Conference on Information Security","author":"J Cathalo","year":"2004","unstructured":"Cathalo J, Libert B, Quisquater J. Cryptanalysis of a verifiably committed signature scheme based on GPS and RSA. In: Proceedings of the 4th Conference on Information Security. 2004, 52\u201360"},{"key":"1268_CR38","series-title":"LNCS","first-page":"417","volume-title":"ASIACRYPT","author":"F Bao","year":"2004","unstructured":"Bao F. Colluding attacks to a payment protocol and two signature exchange schemes. In: ASIACRYPT 2004, LNCS 3329: 417\u2013429"},{"key":"1268_CR39","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1145\/319709.319728","volume-title":"Proceedings of the 6th ACM conference on Computer and communications security","author":"G Ateniese","year":"1999","unstructured":"Ateniese G. Efficient verifiable encryption (and fair exchange) of digital signatures. In: Proceedings of the 6th ACM conference on Computer and communications security. 1999, 138\u2013146"},{"key":"1268_CR40","first-page":"416","volume-title":"Advances in Cryptology\u2014EUROCRYPT","author":"D Boneh","year":"2003","unstructured":"Boneh D, Gentry C, Lynn B, Shacham H. Aggregate and verifiably encrypted signatures from bilinear maps. Advances in Cryptology\u2014EUROCRYPT 2003, 416\u2013432"},{"key":"1268_CR41","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1007\/978-3-642-04159-4_3","volume-title":"Proceedings of the 13th Workshop on Selected Areas in Cryptography","author":"P Grabher","year":"2009","unstructured":"Grabher P, Gro\u00dfsch\u00e4dl J, Page D. On software parallel implementation of cryptographic pairings. In: Proceedings of the 13th Workshop on Selected Areas in Cryptography. 2009, 35\u201350"},{"key":"1268_CR42","volume-title":"World Scientific","author":"J Gro\u00dfsch\u00e4dl","year":"2010","unstructured":"Gro\u00dfsch\u00e4dl J. Personal communications. World Scientific, 2010"},{"key":"1268_CR43","doi-asserted-by":"crossref","unstructured":"G\u00fcrgens S, Rudolph C. Security analysis of (un-) fair non-repudiation protocols. Formal Aspects of Security, 2003, 229\u2013232","DOI":"10.1007\/978-3-540-40981-6_10"},{"issue":"2","key":"1268_CR44","first-page":"203","volume":"46","author":"D Boneh","year":"1999","unstructured":"Boneh D. Twenty years of attacks on the RSA cryptosystem. Notices of the AMS, 1999, 46(2): 203\u2013213","journal-title":"Notices of the AMS"},{"key":"1268_CR45","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1007\/11602897_3","volume-title":"Proceedings of the 7th international conference on Information and Communications Security","author":"J Cederquist","year":"2005","unstructured":"Cederquist J, Corin R, Dashti M. On the quest for impartiality: design and analysis of a fair non-repudiation protocol. In: Proceedings of the 7th international conference on Information and Communications Security. 2005, 27\u201339"},{"key":"1268_CR46","first-page":"316","volume-title":"Proceedings of the 10th international conference on Static analysis","author":"M Abadi","year":"2003","unstructured":"Abadi M, Blanchet B. Computer-assisted verification of a protocol for certified email. In: Proceedings of the 10th international conference on Static analysis. 2003, 316\u2013335"},{"issue":"1","key":"1268_CR47","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1016\/S1567-8326(02)00038-3","volume":"55","author":"J Groote","year":"2003","unstructured":"Groote J, Pang J, Wouters A. Analysis of a distributed system for lifting trucks. Journal of Logic and Algebraic Programming, 2003, 55(1): 21\u201356","journal-title":"Journal of Logic and Algebraic Programming"},{"issue":"1","key":"1268_CR48","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10703-006-0004-3","volume":"29","author":"W Fokkink","year":"2006","unstructured":"Fokkink W, Pang J, Pol v.d J. Cones and foci: a mechanical framework for protocol verification. Formal Methods in System Design, 2006, 29(1): 1\u201331","journal-title":"Formal Methods in System Design"},{"key":"1268_CR49","doi-asserted-by":"crossref","unstructured":"Pang J, Fokkink W, Hofman R, Veldema R. Model checking a cache coherence protocol for a Java DSM implementation. In: Proceedings of the 17th International Symposium on Parallel and Distributed Processing. 2003, 238\u2013249","DOI":"10.1109\/IPDPS.2003.1213433"},{"key":"1268_CR50","doi-asserted-by":"crossref","first-page":"396","DOI":"10.1007\/3-540-36103-0_40","volume-title":"Proceedings of the 4th Conference on Formal Engineering Methods","author":"J Pang","year":"2002","unstructured":"Pang J. Analysis of a security protocol in \u00b5CRL. In: Proceedings of the 4th Conference on Formal Engineering Methods. 2002, 396\u2013400"},{"issue":"1","key":"1268_CR51","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1016\/j.entcs.2005.09.005","volume":"139","author":"S Blom","year":"2005","unstructured":"Blom S, Groote J, Mauw S, Serebrenik A. Analysing the BKE-security protocol with \u00b5CRL. Electronic Notes in Theoretical Computer Science, 2005, 139(1): 49\u201390","journal-title":"Electronic Notes in Theoretical Computer Science"},{"key":"1268_CR52","first-page":"301","volume-title":"Proceedings of the 2nd international conference on Trustworthy global computing","author":"T Chothia","year":"2006","unstructured":"Chothia T, Orzan S, Pang J, Dashti M. A framework for automatically checking anonymity with \u00b5CRL. In: Proceedings of the 2nd international conference on Trustworthy global computing. 2006, 301\u2013318"},{"key":"1268_CR53","volume-title":"Extending a certified email protocol with ttp transparency and its formal verification","author":"Z Liu","year":"2010","unstructured":"Liu Z. Extending a certified email protocol with ttp transparency and its formal verification. Master\u2019s thesis, University of Luxembourg, 2010"},{"key":"1268_CR54","volume-title":"A calculus of communicating systems","author":"R Milner","year":"1982","unstructured":"Milner R. A calculus of communicating systems. Springer-Verlag New York, Inc, 1982"},{"key":"1268_CR55","doi-asserted-by":"crossref","first-page":"220","DOI":"10.1007\/978-3-540-45099-3_12","volume-title":"Proceedings of the 7th International Symposium on Static Analysis","author":"T Henzinger","year":"2000","unstructured":"Henzinger T, Majumdar R, Mang F, Raskin J. Abstract interpretation of game properties. In: Proceedings of the 7th International Symposium on Static Analysis. 2000, 220\u2013239"},{"issue":"4","key":"1268_CR56","doi-asserted-by":"crossref","first-page":"527","DOI":"10.1142\/S0129054103001881","volume":"14","author":"E Emerson","year":"2003","unstructured":"Emerson E, Namjoshi K. On reasoning about rings. International Journal of Foundations of Computer Science, 2003, 14(4): 527\u2013549","journal-title":"International Journal of Foundations of Computer Science"},{"issue":"1\u20132","key":"1268_CR57","doi-asserted-by":"crossref","first-page":"85","DOI":"10.3233\/JCS-1998-61-205","volume":"6","author":"L Paulson","year":"1998","unstructured":"Paulson L. The inductive approach to verifying cryptographic protocols. Journal of computer security, 1998, 6(1\u20132): 85\u2013128","journal-title":"Journal of computer security"},{"issue":"3","key":"1268_CR58","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1145\/373243.360213","volume":"36","author":"M Abadi","year":"2001","unstructured":"Abadi M, Fournet C. Mobile values, new names, and secure communication. ACM SIGPLAN Notices, 2001, 36(3): 104\u2013115","journal-title":"ACM SIGPLAN Notices"}],"container-title":["Frontiers of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-013-1268-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11704-013-1268-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-013-1268-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,30]],"date-time":"2023-06-30T08:53:24Z","timestamp":1688115204000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11704-013-1268-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,3,14]]},"references-count":58,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2013,4]]}},"alternative-id":["1268"],"URL":"https:\/\/doi.org\/10.1007\/s11704-013-1268-6","relation":{},"ISSN":["2095-2228","2095-2236"],"issn-type":[{"value":"2095-2228","type":"print"},{"value":"2095-2236","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,3,14]]}}}