{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T07:21:24Z","timestamp":1763018484493,"version":"3.37.3"},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2022,4,20]],"date-time":"2022-04-20T00:00:00Z","timestamp":1650412800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,4,20]],"date-time":"2022-04-20T00:00:00Z","timestamp":1650412800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2022,7]]},"DOI":"10.1007\/s12083-022-01313-8","type":"journal-article","created":{"date-parts":[[2022,4,20]],"date-time":"2022-04-20T08:04:02Z","timestamp":1650441842000},"page":"1792-1816","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Lightweight verifiable data management system for cloud-assisted wireless body area networks"],"prefix":"10.1007","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8685-0991","authenticated-orcid":false,"given":"Mohammad","family":"Ali","sequence":"first","affiliation":[]},{"given":"Ximeng","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,4,20]]},"reference":[{"key":"1313_CR1","doi-asserted-by":"crossref","unstructured":"Alimorad N, Maadani M, Mahdavi M (2021)\u00a0REO: a reliable and energy efficient optimization algorithm for Beacon-enabled 802.15. 4 based wireless body area networks. IEEE Sens J 21(17):19623-19630","DOI":"10.1109\/JSEN.2021.3091768"},{"issue":"2","key":"1313_CR2","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1007\/s12083-017-0602-4","volume":"12","author":"T Bai","year":"2019","unstructured":"Bai T, Lin J, Li G, Wang H, Ran P, Li Z, Pang Y, Wu W, Jeon G (2019) An optimized protocol for QoS and energy efficiency on wireless body area networks. Peer Peer Netw Appl 12(2):326\u2013336","journal-title":"Peer Peer Netw Appl"},{"issue":"1","key":"1313_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1743-0003-2-6","volume":"2","author":"E Jovanov","year":"2005","unstructured":"Jovanov E, Milenkovic A, Otto C, De Groen PC (2005) A wireless body area network of intelligent motion sensors for computer assisted physical rehabilitation. J Neuroeng Rehabil 2(1):1\u201310","journal-title":"J Neuroeng Rehabil"},{"issue":"5","key":"1313_CR4","doi-asserted-by":"publisher","first-page":"1289","DOI":"10.1007\/s12083-018-0705-6","volume":"12","author":"T Hayajneh","year":"2019","unstructured":"Hayajneh T, Griggs K, Imran M, Mohd BJ (2019) Secure and efficient data delivery for fog-assisted wireless body area networks. Peer Peer Netw Appl 12(5):1289\u20131307","journal-title":"Peer Peer Netw Appl"},{"issue":"2","key":"1313_CR5","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1109\/TMSCS.2016.2525997","volume":"2","author":"C Hu","year":"2016","unstructured":"Hu C, Li H, Huo Y, Xiang T, Liao X (2016) Secure and efficient data communication protocol for wireless body area networks. IEEE Trans Multi-Scale Comput Syst 2(2):94\u2013107","journal-title":"IEEE Trans Multi-Scale Comput Syst"},{"issue":"5","key":"1313_CR6","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/MNET.2013.6616116","volume":"27","author":"J Wan","year":"2013","unstructured":"Wan J, Zou C, Ullah S, Lai CF, Zhou M, Wang X (2013) Cloud-enabled wireless body area networks for pervasive healthcare. IEEE Netw 27(5):56\u201361","journal-title":"IEEE Netw"},{"issue":"4","key":"1313_CR7","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/1721654.1721672","volume":"53","author":"M Armbrust","year":"2010","unstructured":"Armbrust M, Fox A, Griffith R, Joseph AD, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I, Zaharia M (2010) A view of cloud computing. Commun ACM 53(4):50\u201358","journal-title":"Commun ACM"},{"issue":"1","key":"1313_CR8","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1109\/JSYST.2015.2428620","volume":"12","author":"D He","year":"2015","unstructured":"He D, Zeadally S, Wu L (2015) Certificateless public auditing scheme for cloud-assisted wireless body area networks. IEEE Syst J 12(1):64\u201373","journal-title":"IEEE Syst J"},{"key":"1313_CR9","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.tcs.2020.02.030","volume":"815","author":"M Ali","year":"2020","unstructured":"Ali M, Mohajeri J, Sadeghi MR, Liu X (2020) A fully distributed hierarchical attribute-based encryption scheme. Theoret Comput Sci 815:25\u201346","journal-title":"Theoret Comput Sci"},{"key":"1313_CR10","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2940573","author":"Y Miao","year":"2019","unstructured":"Miao Y, Deng R, Choo KKR, Liu X, Ning J, Li H (2019) Optimized verifiable fine-grained keyword search in dynamic multi-owner settings. IEEE Trans Dependable Secure Comput. https:\/\/doi.org\/10.1109\/TDSC.2019.2940573","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"4","key":"1313_CR11","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1109\/TIFS.2016.2615853","volume":"12","author":"Y Yu","year":"2016","unstructured":"Yu Y, Au MH, Ateniese G, Huang X, Susilo W, Dai Y, Min G (2016) Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Trans Inf Forensics Secur 12(4):767\u2013778","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"4","key":"1313_CR12","doi-asserted-by":"publisher","first-page":"3008","DOI":"10.1109\/JIOT.2017.2779124","volume":"5","author":"Y Miao","year":"2017","unstructured":"Miao Y, Ma J, Liu X, Li X, Liu Z, Li H (2017) Practical attribute-based multi-keyword search scheme in mobile crowdsourcing. IEEE Internet Things J 5(4):3008\u20133018","journal-title":"IEEE Internet Things J"},{"key":"1313_CR13","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1016\/j.comnet.2018.01.036","volume":"133","author":"S Belguith","year":"2018","unstructured":"Belguith S, Kaaniche N, Laurent M, Jemai A, Attia R (2018) Phoabe: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted iot. Comput Netw 133:141\u2013156","journal-title":"Comput Netw"},{"key":"1313_CR14","doi-asserted-by":"crossref","unstructured":"Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In 2007 IEEE symposium on security and privacy (SP'07) (pp. 321-334) IEEE","DOI":"10.1109\/SP.2007.11"},{"key":"1313_CR15","unstructured":"Green M, Hohenberger S, Waters B (2011) Outsourcing the Decryption of {ABE} Ciphertexts. In 20th USENIX Security Symposium (USENIX Security 11) (No. 3)"},{"key":"1313_CR16","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1016\/j.jnca.2018.01.016","volume":"108","author":"Z Liu","year":"2018","unstructured":"Liu Z, Jiang ZL, Wang X, Yiu SM (2018) Practical attribute-based encryption: Outsourcing decryption, attribute revocation and policy updating. J Netw Comput Appl 108:112\u2013123","journal-title":"J Netw Comput Appl"},{"key":"1313_CR17","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1016\/j.jss.2016.12.018","volume":"125","author":"R Zhang","year":"2017","unstructured":"Zhang R, Ma H, Lu Y (2017) Fine-grained access control system based on fully outsourced attribute-based encryption. J Syst Softw 125:344\u2013353","journal-title":"J Syst Softw"},{"issue":"3","key":"1313_CR18","doi-asserted-by":"publisher","first-page":"660","DOI":"10.1109\/TCC.2018.2825983","volume":"8","author":"MH Ameri","year":"2018","unstructured":"Ameri MH, Delavar M, Mohajeri J, Salmasizadeh M (2018) A key-policy attribute-based temporary keyword search scheme for secure cloud storage. IEEE Trans Cloud Comput 8(3):660\u2013671","journal-title":"IEEE Trans Cloud Comput"},{"key":"1313_CR19","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2019.2959306","author":"Y Chen","year":"2019","unstructured":"Chen Y, Li W, Gao F, Wen Q, Zhang H, Wang H (2019) Practical Attribute-based Multi-Keyword Ranked Search Scheme in Cloud Computing. IEEE Trans Serv Comput. https:\/\/doi.org\/10.1109\/TSC.2019.2959306","journal-title":"IEEE Trans Serv Comput"},{"issue":"4","key":"1313_CR20","doi-asserted-by":"publisher","first-page":"1187","DOI":"10.1109\/TPDS.2014.2355202","volume":"27","author":"W Sun","year":"2014","unstructured":"Sun W, Yu S, Lou W, Hou YT, Li H (2014) Protecting your right: Verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. IEEE Trans Parallel Distrib Syst 27(4):1187\u20131198","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"1313_CR21","doi-asserted-by":"crossref","unstructured":"Wang H, Dong X, Cao Z (2017)\u00a0Multi-value-independent ciphertext-policy attribute based encryption with fast keyword search. IEEE Trans Serv Comput 13(6):1142\u20131151","DOI":"10.1109\/TSC.2017.2753231"},{"issue":"1","key":"1313_CR22","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1109\/JIOT.2017.2775048","volume":"5","author":"DR Chen","year":"2017","unstructured":"Chen DR, Chiu WM (2017) Collaborative link-aware protocols for energy-efficient and QoS wireless body area networks using integrated sensors. IEEE Internet Things J 5(1):132\u2013149","journal-title":"IEEE Internet Things J"},{"issue":"4","key":"1313_CR23","doi-asserted-by":"publisher","first-page":"1088","DOI":"10.3390\/s20041088","volume":"20","author":"M Ali","year":"2020","unstructured":"Ali M, Sadeghi MR, Liu X (2020) Lightweight fine-grained access control for wireless body area networks. Sensors 20(4):1088","journal-title":"Sensors"},{"issue":"8","key":"1313_CR24","doi-asserted-by":"publisher","first-page":"1343","DOI":"10.1109\/TIFS.2013.2271848","volume":"8","author":"J Lai","year":"2013","unstructured":"Lai J, Deng RH, Guan C, Weng J (2013) Attribute-based encryption with verifiable outsourced decryption. IEEE Trans Inf Forensics Secur 8(8):1343\u20131354","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"3","key":"1313_CR25","doi-asserted-by":"publisher","first-page":"478","DOI":"10.1109\/TSC.2017.2710190","volume":"13","author":"J Li","year":"2017","unstructured":"Li J, Wang Y, Zhang Y, Han J (2017) Full verifiability for outsourced decryption in attribute based encryption. IEEE Trans Serv Comput 13(3):478\u2013487","journal-title":"IEEE Trans Serv Comput"},{"issue":"10","key":"1313_CR26","doi-asserted-by":"publisher","first-page":"2119","DOI":"10.1109\/TIFS.2015.2449264","volume":"10","author":"S Lin","year":"2015","unstructured":"Lin S, Zhang R, Ma H, Wang M (2015) Revisiting attribute-based encryption with verifiable outsourced decryption. IEEE Trans Inf Forensics Secur 10(10):2119\u20132130","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"1313_CR27","doi-asserted-by":"crossref","unstructured":"Ning J, Cao Z, Dong X, Liang K, Ma H, Wei L (2017) Auditable $$\\sigma$$-time outsourced attribute-based encryption for access control in cloud computing. IEEE Trans Inf Forensics Secur 13(1):94\u2013105","DOI":"10.1109\/TIFS.2017.2738601"},{"key":"1313_CR28","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2897675","author":"Y Miao","year":"2019","unstructured":"Miao Y, Liu X, Choo KKR, Deng RH, Li J, Li H, Ma J (2019) Privacy-preserving attribute-based keyword search in shared multi-owner setting. IEEE Trans Dependable Secure Comput. https:\/\/doi.org\/10.1109\/TDSC.2019.2897675","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"1313_CR29","doi-asserted-by":"crossref","unstructured":"Miao Y, Ma J, Liu X, Li X, Jiang Q, Zhang J (2017)\u00a0Attribute-based keyword search over hierarchical data in cloud computing. IEEE Trans Serv Comput 13(6):985\u2013998","DOI":"10.1109\/TSC.2017.2757467"},{"key":"1313_CR30","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1016\/j.ins.2018.06.066","volume":"465","author":"Y Miao","year":"2018","unstructured":"Miao Y, Weng J, Liu X, Choo KKR, Liu Z, Li H (2018) Enabling verifiable multiple keywords search over encrypted cloud data. Inf Sci 465:21\u201337","journal-title":"Inf Sci"},{"key":"1313_CR31","doi-asserted-by":"crossref","unstructured":"Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D (2007)\u00a0Provable data possession at untrusted stores. In Proceedings of the 14th ACM conference on Computer and communications security (pp. 598-609)","DOI":"10.1145\/1315245.1315318"},{"key":"1313_CR32","first-page":"150","volume":"2006","author":"DL Gazzoni Filho","year":"2006","unstructured":"Gazzoni Filho DL, Barreto PSLM (2006) Demonstrating data possession and uncheatable data transfer. IACR Cryptol. ePrint Arch. 2006:150","journal-title":"IACR Cryptol. ePrint Arch."},{"issue":"2","key":"1313_CR33","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1109\/TSC.2014.1","volume":"8","author":"H Wang","year":"2014","unstructured":"Wang H (2014) Identity-based distributed provable data possession in multicloud storage. IEEE Trans Serv Comput 8(2):328\u2013340","journal-title":"IEEE Trans Serv Comput"},{"key":"1313_CR34","doi-asserted-by":"crossref","unstructured":"Sahai A, Waters B (2005)\u00a0Fuzzy identity-based encryption In: Annual International Conference on the Theory and Applications of Cryptographic Techniques 457\u2013473","DOI":"10.1007\/11426639_27"},{"key":"1313_CR35","doi-asserted-by":"crossref","unstructured":"Goyal V, Pandey O, Sahai A Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In Proceedings of the 13th ACM conference on Computer and communications security (pp. 89-98)","DOI":"10.1145\/1180405.1180418"},{"key":"1313_CR36","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1016\/j.ins.2020.05.041","volume":"536","author":"M Ali","year":"2020","unstructured":"Ali M, Mohajeri J, Sadeghi MR, Liu X (2020) Attribute-based fine-grained access control for outscored private set intersection computation. Inf Sci 536:222\u2013243","journal-title":"Inf Sci"},{"key":"1313_CR37","unstructured":"Chegenizadeh M, Ali M, Mohajeri J, Aref MR (2021)\u00a0HUAP: Practical Attribute-based Access Control Supporting Hidden Updatable Access Policies for Resource-Constrained Devices. arXiv preprint arXiv:2107.10133"},{"key":"1313_CR38","doi-asserted-by":"publisher","first-page":"23951","DOI":"10.1109\/ACCESS.2020.2969957","volume":"8","author":"M Ali","year":"2020","unstructured":"Ali M, Sadeghi MR, Liu X (2020) Lightweight Revocable Hierarchical Attribute-Based Encryption for Internet of Things. IEEE Access 8:23951\u201323964","journal-title":"IEEE Access"},{"key":"1313_CR39","unstructured":"Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In Proceeding 2000 IEEE Symposium on Security and Privacy. S&P (pp. 44-55)"},{"key":"1313_CR40","doi-asserted-by":"crossref","unstructured":"Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. In International conference on the theory and applications of cryptographic techniques (pp. 506-522). Springer, Berlin, Heidelberg","DOI":"10.1007\/978-3-540-24676-3_30"},{"key":"1313_CR41","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1016\/j.ins.2019.11.013","volume":"514","author":"Z Guan","year":"2020","unstructured":"Guan Z, Liu X, Wu L, Wu J, Xu R, Zhang J, Li Y (2020) Cross-lingual multi-keyword rank search with semantic extension over encrypted data. Inf Sci 514:523\u2013540","journal-title":"Inf Sci"},{"key":"1313_CR42","doi-asserted-by":"crossref","unstructured":"Ali M, Sadeghi MR (2021)\u00a0Provable secure lightweight attribute\u2013based keyword search for cloud-Internet of Things networks. Trans Emerg Telecommun Technol 32(5):e3905","DOI":"10.1002\/ett.3905"},{"key":"1313_CR43","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.2963978","author":"C Ge","year":"2020","unstructured":"Ge C, Susilo W, Liu Z, Xia J, Szalachowski P, Liming F (2020) Secure keyword search and data sharing mechanism for cloud computing. IEEE Trans Dependable Secure Comput. https:\/\/doi.org\/10.1109\/TDSC.2020.2963978","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"1313_CR44","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.2970928","author":"L Xu","year":"2020","unstructured":"Xu L, Chen X, Zhang F, Li W, Wu HT, Tang S, Xiang Y (2020) ASBKS: Towards attribute set based keyword search over encrypted personal health records. IEEE Trans Dependable Secure Comput. https:\/\/doi.org\/10.1109\/TDSC.2020.2970928","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"1313_CR45","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2020.2973570","author":"P Chaudhari","year":"2020","unstructured":"Chaudhari P, Das ML (2020) KeySea: Keyword-based Search with Receiver Anonymity in Attribute-based Searchable Encryption. IEEE Trans Serv Comput Early Access. https:\/\/doi.org\/10.1109\/TSC.2020.2973570","journal-title":"IEEE Trans Serv Comput Early Access."},{"key":"1313_CR46","doi-asserted-by":"crossref","unstructured":"Deswarte Y, Quisquater JJ, Sadane A (2003)\u00a0 Remote integrity checking. In Working conference on integrity and internal control in information systems (pp. 1-11). Springer, Boston, MA","DOI":"10.1007\/1-4020-7901-X_1"},{"key":"1313_CR47","doi-asserted-by":"crossref","unstructured":"Juels, A, Kaliski Jr BS (2007) PORs: Proofs of retrievability for large files. In Proceedings of the 14th ACM conference on Computer and communications security (pp. 584-597)","DOI":"10.1145\/1315245.1315317"},{"issue":"6","key":"1313_CR48","doi-asserted-by":"publisher","first-page":"1165","DOI":"10.1109\/TIFS.2016.2520886","volume":"11","author":"H Wang","year":"2016","unstructured":"Wang H, He D, Tang S (2016) Identity-based proxy-oriented data uploading and remote data integrity checking in public cloud. IEEE Trans Inf Forensics Secur 11(6):1165\u20131176","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"1313_CR49","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2019.2941882","author":"T Shang","year":"2019","unstructured":"Shang T, Zhang F, Chen X, Liu J, Lu X (2019) Identity-based dynamic data auditing for big data storage. IEEE Trans Big Data Early Access. https:\/\/doi.org\/10.1109\/TBDATA.2019.2941882","journal-title":"IEEE Trans Big Data Early Access."},{"key":"1313_CR50","doi-asserted-by":"crossref","unstructured":"Mahmoody M, Pass R (2012)\u00a0The curious case of non-interactive commitments\u2013on the power of black-box vs. non-black-box use of primitives. In Annual Cryptology Conference (pp. 701-718). Springer, Berlin, Heidelberg","DOI":"10.1007\/978-3-642-32009-5_41"},{"key":"1313_CR51","doi-asserted-by":"crossref","unstructured":"Katz J, Lindell Y (2020)\u00a0Introduction to modern cryptography. CRC Press","DOI":"10.1201\/9781351133036"},{"key":"1313_CR52","unstructured":"Lynn B (2006) PBC library \u2013 pairing-based cryptography. Stanford University. http:\/\/crypto.stanford.edu\/pbc"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-022-01313-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-022-01313-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-022-01313-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,2]],"date-time":"2022-07-02T12:30:20Z","timestamp":1656765020000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-022-01313-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,20]]},"references-count":52,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,7]]}},"alternative-id":["1313"],"URL":"https:\/\/doi.org\/10.1007\/s12083-022-01313-8","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2022,4,20]]},"assertion":[{"value":"1 July 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 March 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 April 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they do not have any commercial or associative interest that represents a conflict of interest inconnection with the manuscript","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}