{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T13:50:40Z","timestamp":1767707440534,"version":"3.37.3"},"reference-count":63,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T00:00:00Z","timestamp":1656288000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T00:00:00Z","timestamp":1656288000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2022,9]]},"DOI":"10.1007\/s12083-022-01328-1","type":"journal-article","created":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T04:02:38Z","timestamp":1656302558000},"page":"2179-2198","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["EPSAPI: An efficient and provably secure authentication protocol for an IoT application environment"],"prefix":"10.1007","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3196-1341","authenticated-orcid":false,"given":"Bahaa Hussein Taher","family":"Algubili","sequence":"first","affiliation":[]},{"given":"Neeraj","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Hongwei","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Ali A.","family":"Yassin","sequence":"additional","affiliation":[]},{"given":"Rihab","family":"Boussada","sequence":"additional","affiliation":[]},{"given":"Alzahraa J.","family":"Mohammed","sequence":"additional","affiliation":[]},{"given":"Huiyu","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,6,27]]},"reference":[{"key":"1328_CR1","doi-asserted-by":"crossref","unstructured":"Jia X, Hu N, Su S, Yin S, Zhao Y, Cheng X, Zhang C (2020) IRBA: An Identity-Based Cross-Domain Authentication Scheme for the Internet of Things.Electronics634","DOI":"10.3390\/electronics9040634"},{"key":"1328_CR2","doi-asserted-by":"publisher","first-page":"882","DOI":"10.1016\/j.future.2019.04.019","volume":"100","author":"A Ostad-Sharif","year":"2019","unstructured":"Ostad-Sharif A, Arshad H, Nikooghadam M, Abbasinezhad-Mood D (2019) Three party secure data transmission in IoT networks through design of a lightweight authenticated key agreement scheme. Futur Gener Comput Syst 100:882\u2013892","journal-title":"Futur Gener Comput Syst"},{"key":"1328_CR3","doi-asserted-by":"crossref","unstructured":"Zhang J, Wang Y, Li S, Shi S (2020) An Architecture for IoT-enabled smart transportation security system: A geospatial approach. IEEE Internet Things J 6205\u20136213","DOI":"10.1109\/JIOT.2020.3041386"},{"issue":"4","key":"1328_CR4","doi-asserted-by":"publisher","first-page":"3385","DOI":"10.1007\/s11277-021-08185-w","volume":"118","author":"H Zhao","year":"2021","unstructured":"Zhao H, Yue H, Gu T, Li C, Zhou D (2021) Low delay and seamless connectivity-based message propagation mechanism for VANET of VCPS. Wireless Pers Commun 118(4):3385\u20133402","journal-title":"Wireless Pers Commun"},{"key":"1328_CR5","doi-asserted-by":"crossref","unstructured":"Wu F, Li X, Sangaiah AK, Xu L, Kumari S, Wu L, Shen J (2018) A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks. Future Gener Comput Syst 727\u2013737","DOI":"10.1016\/j.future.2017.08.042"},{"key":"1328_CR6","doi-asserted-by":"crossref","unstructured":"Alexakis G, Panagiotakis S, Fragkakis A, Markakis E, Vassilakis K (2019) Control of smart home operations using natural language processing, voice recognition and IoT technologies in a multi-tier architecture. Designs 32","DOI":"10.3390\/designs3030032"},{"key":"1328_CR7","doi-asserted-by":"crossref","unstructured":"Magaia N, Fonseca R, Muhammad K, Segundo AHF, Neto AVL, de Albuquerque VHC (2020) Industrial internet of things security enhanced with deep learning approaches for smart cities. IEEE Internet Things J 6393\u20136405","DOI":"10.1109\/JIOT.2020.3042174"},{"key":"1328_CR8","doi-asserted-by":"crossref","unstructured":"Wan J, Chen M, Xia F, Li D, Zhou K (2013) From machine-to-machine communications towards cyber-physical systems. Comput Sci Inf Syst 1105\u20131128","DOI":"10.2298\/CSIS120326018W"},{"key":"1328_CR9","doi-asserted-by":"crossref","unstructured":"Gubbi J, Buyya R, Marusic S, Palaniswami M (2013) Internet of Things (IoT): A vision, architectural elements, and future directions. Future Gener Comput Syst 1645\u20131660","DOI":"10.1016\/j.future.2013.01.010"},{"key":"1328_CR10","doi-asserted-by":"crossref","unstructured":"Li CT, Hwang MS (2010) An efficient biometrics-based remote user authentication scheme using smart cards. J Netw Comput Appl 1\u20135","DOI":"10.1016\/j.jnca.2009.08.001"},{"key":"1328_CR11","doi-asserted-by":"crossref","unstructured":"Khan SH, Akbar MA, Shahzad F, Farooq M, Khan Z (2015) Secure biometric template generation for multi-factor authentication. Pattern Recognit 458\u2013472","DOI":"10.1016\/j.patcog.2014.08.024"},{"key":"1328_CR12","doi-asserted-by":"crossref","unstructured":"Taher BH, Jiang S, Yassin AA, Lu H (2019) Low-overhead remote user authentication protocol for iot based on a fuzzy extractor and feature extraction. IEEE Access 148950\u2013148966","DOI":"10.1109\/ACCESS.2019.2946400"},{"key":"1328_CR13","doi-asserted-by":"crossref","unstructured":"Mahmood Z, Ullah A, Ning H (2018) Distributed multiparty key management for efficient authentication in the Internet of things. IEEE Access 29460\u201329473","DOI":"10.1109\/ACCESS.2018.2840131"},{"key":"1328_CR14","doi-asserted-by":"crossref","unstructured":"Shamir A (1984) Identity-based cryptosystems and signature schemes. In Workshop on the theory and application of cryptographic techniques, pp. 47\u201353, Springer, Berlin, Heidelberg","DOI":"10.1007\/3-540-39568-7_5"},{"key":"1328_CR15","doi-asserted-by":"crossref","unstructured":"Chatterjee S, Roy S, Das AK, Chattopadhyay S, Kumar N, Vasilakos AV (2016) Secure biometric-based authentication scheme using Chebyshev chaotic map for multi-server environment. IEEE Trans Depend Secur Comput 824\u2013839","DOI":"10.1109\/TDSC.2016.2616876"},{"issue":"8","key":"1328_CR16","doi-asserted-by":"publisher","first-page":"798","DOI":"10.3390\/math9080798","volume":"9","author":"Y Yu","year":"2021","unstructured":"Yu Y, Taylor O, Li R, Sunagawa B (2021) An extended chaotic map-based authentication and key agreement scheme for multi-server environment. Mathematics 9(8):798","journal-title":"Mathematics"},{"key":"1328_CR17","doi-asserted-by":"crossref","unstructured":"Roy S, Chatterjee S, Das AK, Chattopadhyay S, Kumari S, Jo M (2017) Chaotic map-based anonymous user authentication scheme with user biometrics and fuzzy extractor for crowdsourcing Internet of Things. IEEE Internet Things J 2884\u20132895","DOI":"10.1109\/JIOT.2017.2714179"},{"key":"1328_CR18","doi-asserted-by":"crossref","unstructured":"Li W, Cheng H, Wang P (2019) Secure chaotic maps-based authentication scheme for real-time data access In Internet of Things. In 2019 International Conference on Cyber Security and Protection of Digital Services (Cyber Security) (pp. 1\u20138). IEEE","DOI":"10.1109\/CyberSecPODS.2019.8885375"},{"key":"1328_CR19","doi-asserted-by":"crossref","unstructured":"Challa S, Wazid M, Das AK, Kumar N, Reddy AG, Yoon EJ, Yoo KY (2017) Secure signature-based authenticated key establishment scheme for future IoT applications. IEEE Access 3028\u20133043","DOI":"10.1109\/ACCESS.2017.2676119"},{"key":"1328_CR20","doi-asserted-by":"crossref","unstructured":"Porambage P, Braeken A, Schmitt C, Gurtov A, Ylianttila M, Stiller B (2015) Group key establishment for enabling secure multicast communication in wireless sensor networks deployed for IoT applications. IEEE Access 1503\u20131511","DOI":"10.1109\/ACCESS.2015.2474705"},{"key":"1328_CR21","doi-asserted-by":"crossref","unstructured":"Jia X, He D, Li L, Choo KKR (2018) Signature-based three-factor authenticated key exchange for internet of things applications. Multimed Tools Appl 18355\u201318382","DOI":"10.1007\/s11042-017-5560-6"},{"key":"1328_CR22","doi-asserted-by":"crossref","unstructured":"Moon J, Lee D, Lee Y, Won D (2017) Improving biometric-based authentication schemes with smart card revocation \/ reissue for wireless sensor networks. Sensors 940","DOI":"10.3390\/s17050940"},{"key":"1328_CR23","unstructured":"Wang C, Wang D, Tu Y, Xu G, Wang H (2020) Understanding node capture attacks in user authentication schemes for wireless sensor networks. IEEE Trans Depend Secur Comput 1\u20131"},{"issue":"4","key":"1328_CR24","doi-asserted-by":"publisher","first-page":"136","DOI":"10.3390\/info8040136","volume":"8","author":"AK Maurya","year":"2017","unstructured":"Maurya AK, Sastry VN (2017) Fuzzy extractor and elliptic curve based efficient user authentication protocol for wireless sensor networks and Internet of Things. Information 8(4):136","journal-title":"Information"},{"key":"1328_CR25","doi-asserted-by":"crossref","unstructured":"Shin S, Kwon T (2020) A privacy-preserving authentication, authorization, and key agreement scheme for wireless sensor networks in 5G-integrated Internet of Things. IEEE Access 67555\u201367571\u200f","DOI":"10.1109\/ACCESS.2020.2985719"},{"key":"1328_CR26","doi-asserted-by":"crossref","unstructured":"Li X, Niu J, Bhuiyan MZA, Wu F, Karuppiah M, Kumari S (2017) A robust ECC-based provable secure authentication protocol with privacy preserving for industrial internet of things. IEEE Trans Ind Inf 3599\u20133609","DOI":"10.1109\/TII.2017.2773666"},{"key":"1328_CR27","doi-asserted-by":"crossref","unstructured":"Kavianpour S, Shanmugam B, Azam S, Zamani M, Narayana Samy G, De Boer F (2018) A systematic literature review of authentication in internet of things for heterogeneous devices. J Comput Netw Commun2019","DOI":"10.1155\/2019\/5747136"},{"key":"1328_CR28","doi-asserted-by":"crossref","unstructured":"Ali R, Pal AK (2018) An efficient three factor\u2013based authentication scheme in multiserver environment using ECC. Int J Commun Syst 31(4):e3484","DOI":"10.1002\/dac.3484"},{"key":"1328_CR29","doi-asserted-by":"crossref","unstructured":"Wang F, Xu G, Wang C, Peng J (2019) A provably secure biometrics-based authentication scheme for multiserver environment. Secur Commun Netw","DOI":"10.1155\/2019\/2838615"},{"key":"1328_CR30","doi-asserted-by":"crossref","unstructured":"Li X, Niu J, Kumari S, Wu F, Sangaiah AK, Choo KKR (2018) A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments. J Netw Comput Appl 103:194\u2013204","DOI":"10.1016\/j.jnca.2017.07.001"},{"key":"1328_CR31","doi-asserted-by":"crossref","unstructured":"Ryu J, Lee H, Kim H, Won D (2018) Secure and efficient three-factor protocol for wireless sensor networks. Sensors 4481","DOI":"10.3390\/s18124481"},{"key":"1328_CR32","doi-asserted-by":"crossref","unstructured":"Wang F, Xu G, Xu G (2019) provably secure anonymous biometrics-based authentication scheme for wireless sensor networks using chaotic map. IEEE Access 101596\u2013101608","DOI":"10.1109\/ACCESS.2019.2930542"},{"key":"1328_CR33","unstructured":"Tai WL, Chang YF, Hou PL (2019) Security analysis of a three-factor anonymous authentication scheme for wireless sensor networks in Internet of Things environments. Int J Netw Secur 1014\u20131020"},{"issue":"3","key":"1328_CR34","first-page":"232","volume":"17","author":"H Zhao","year":"2019","unstructured":"Zhao H, Yue H, Gu T, Li W (2019) CPS-based reliability enhancement mechanism for vehicular emergency warning system. Int J Intell Transp Syst Res 17(3):232\u2013241","journal-title":"Int J Intell Transp Syst Res"},{"key":"1328_CR35","doi-asserted-by":"crossref","unstructured":"Mo J, Hu Z, Chen H, Shen W (2019) An efficient and provably secure anonymous user authentication and key agreement for mobile cloud computing. Wirel Commun Mob Computi","DOI":"10.1155\/2019\/4520685"},{"key":"1328_CR36","doi-asserted-by":"crossref","unstructured":"Ghani A, Mansoor K, Mehmood S, Chaudhry SA, Rahman AU, Najmus Saqib M (2019) Security and key management in IoT-based wireless sensor networks: an authentication protocol using symmetric key. Int J Commun Syst 32(16):e4139","DOI":"10.1002\/dac.4139"},{"issue":"9","key":"1328_CR37","doi-asserted-by":"publisher","first-page":"2098","DOI":"10.3390\/s19092098","volume":"19","author":"R Mart\u00ednez-Pel\u00e1ez","year":"2019","unstructured":"Mart\u00ednez-Pel\u00e1ez R, Toral-Cruz H, Parra-Michel JR, Garc\u00eda V, Mena LJ, F\u00e9lix VG, Ochoa-Brust A (2019) An enhanced lightweight IoT-based authentication scheme in cloud computing circumstances. Sensors 19(9):2098","journal-title":"Sensors"},{"key":"1328_CR38","doi-asserted-by":"publisher","first-page":"882","DOI":"10.1016\/j.future.2019.04.019","volume":"100","author":"A Ostad-Sharif","year":"2019","unstructured":"Ostad-Sharif A, Arshad H, Nikooghadam M, Abbasinezhad-Mood D (2019) Three party secure data transmission in IoT networks through design of a lightweight authenticated key agreement scheme. Future Gener Comput Syst 100:882\u2013892","journal-title":"Future Gener Comput Syst"},{"key":"1328_CR39","doi-asserted-by":"crossref","unstructured":"Chen Y, Ge Y, Wang Y, Zeng Z (2019) An improved three-factor user authentication and key agreement scheme for wireless medical sensor networks. IEEE Access 7:85440\u201385451","DOI":"10.1109\/ACCESS.2019.2923777"},{"key":"1328_CR40","doi-asserted-by":"crossref","unstructured":"Wang F, Xu G, Xu G, Wang Y, Peng J (2020) A robust IoT-based three-factor authentication scheme for cloud computing resistant to session key exposure. Wirel Commun Mob Comput","DOI":"10.1155\/2020\/3805058"},{"key":"1328_CR41","doi-asserted-by":"crossref","unstructured":"Wu F, Li X, Xu L, Vijayakumar P, Kumar N (2020) A novel three-factor authentication protocol for wireless sensor networks with IoT notion. IEEE Syst J","DOI":"10.1109\/JSYST.2020.2981049"},{"issue":"4","key":"1328_CR42","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1002\/sat.1033","volume":"31","author":"CC Lee","year":"2013","unstructured":"Lee CC (2013) A simple key agreement scheme based on chaotic maps for VSAT satellite communications. Int J Satell Commun Network 31(4):177\u2013186","journal-title":"Int J Satell Commun Network"},{"key":"1328_CR43","doi-asserted-by":"crossref","unstructured":"He D, Kumar N, Lee JH, Sherratt RS (2014) Enhanced three-factor security protocol for consumer USB mass storage devices. IEEE Trans Consum Electron 30\u201337","DOI":"10.1109\/TCE.2014.6780922"},{"key":"1328_CR44","doi-asserted-by":"crossref","unstructured":"Tsai JL, Lo NW (2015) A chaotic map\u2010based anonymous multi\u2010server authenticated key agreement protocol using smart card. Int J Commun Syst1955\u20131963","DOI":"10.1002\/dac.2829"},{"key":"1328_CR45","doi-asserted-by":"crossref","unstructured":"Bergamo P, D'Arco P, De Santis A, Kocarev L (2005) Security of public-key cryptosystems based on Chebyshev polynomials. IEEE Trans Circuits Syst I Regul Pap 1382\u20131393","DOI":"10.1109\/TCSI.2005.851701"},{"key":"1328_CR46","doi-asserted-by":"crossref","unstructured":"Irshad A, Sher M, Ashraf MU, Alzahrani BA, Wu F, Xie Q, Kumari S (2017) An improved and secure chaotic-map based multi-server authentication protocol based on lu et al. and Tsai and Lo\u2019s scheme. Wirel Person Commun 3185\u20133208","DOI":"10.1007\/s11277-017-3990-0"},{"key":"1328_CR47","doi-asserted-by":"crossref","unstructured":"Lin HY (2015) Improved chaotic maps-based password-authenticated key agreement using smart cards. Commun Nonlinear Sci Numer Simul 482\u2013488","DOI":"10.1016\/j.cnsns.2014.05.027"},{"key":"1328_CR48","doi-asserted-by":"crossref","unstructured":"Guo C, Chang CC (2013) Chaotic maps-based password-authenticated key agreement using smart cards. Commun Nonlinear Sci Numer Simul 1433\u20131440","DOI":"10.1016\/j.cnsns.2012.09.032"},{"key":"1328_CR49","doi-asserted-by":"crossref","unstructured":"Wu F, Xu L (2017) A chaotic map-based authentication and key agreement scheme with user anonymity for cloud computing. Int Conf Cloud Comput Secur 189\u2013200","DOI":"10.1007\/978-3-319-68542-7_16"},{"key":"1328_CR50","doi-asserted-by":"crossref","unstructured":"Li J, Zhang W, Kumari S, Choo KKR, Hogrefe D (2018) Security analysis and improvement of a mutual authentication and key agreement solution for wireless sensor networks using chaotic maps. Trans Emerg Telecommun Technol e3295","DOI":"10.1002\/ett.3295"},{"key":"1328_CR51","doi-asserted-by":"crossref","unstructured":"Kumari S, Li X, Wu F, Das AK, Arshad H, Khan MK (2016) A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps. Futur Gener Comput Syst 63:56\u201375","DOI":"10.1016\/j.future.2016.04.016"},{"key":"1328_CR52","doi-asserted-by":"crossref","unstructured":"Lee CC, Li CT, Chiu ST, Lai YM (2015) A new three-party-authenticated key agreement scheme based on chaotic maps without password table. Nonlinear Dyn 2485\u20132495","DOI":"10.1007\/s11071-014-1827-x"},{"issue":"2","key":"1328_CR53","doi-asserted-by":"publisher","first-page":"811","DOI":"10.1007\/s13369-017-2764-z","volume":"43","author":"A Irshad","year":"2018","unstructured":"Irshad A, Chaudhry SA, Xie Q, Li X, Farash MS, Kumari S, Wu F (2018) An enhanced and provably secure chaotic map-based authenticated key agreement in multi-server architecture. Arab J Sci Eng 43(2):811\u2013828","journal-title":"Arab J Sci Eng"},{"key":"1328_CR54","doi-asserted-by":"crossref","unstructured":"Zhang S, Du X, Liu X (2020) A Secure Remote Mutual Authentication Scheme Based on Chaotic Map for Underwater Acoustic Networks. IEEE Access 48285\u201348298","DOI":"10.1109\/ACCESS.2020.2979906"},{"key":"1328_CR55","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2019.04.226","volume":"526","author":"H Zhao","year":"2019","unstructured":"Zhao H, Chen Q, Shi W, Gu T, Li W (2019) Stability analysis of an improved car-following model accounting for the driver\u2019s characteristics and automation. Phys A 526","journal-title":"Phys A"},{"key":"1328_CR56","doi-asserted-by":"crossref","unstructured":"Jabbari A, Mohasefi JB (2019) Improvement in new three-party-authenticated key agreement scheme based on chaotic maps without password table. Nonlinear Dyn 3177\u20133191","DOI":"10.1007\/s11071-018-04748-y"},{"key":"1328_CR57","doi-asserted-by":"crossref","unstructured":"Zhang L (2008) Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos Solit Fractals 669\u2013674","DOI":"10.1016\/j.chaos.2006.09.047"},{"key":"1328_CR58","doi-asserted-by":"publisher","first-page":"1267","DOI":"10.1016\/j.future.2018.04.019","volume":"108","author":"S Challa","year":"2020","unstructured":"Challa S, Das AK, Gope P, Kumar N, Wu F, Vasilakos AV (2020) Design and analysis of authenticated key agreement scheme in cloud-assisted cyber\u2013physical systems. Futur Gener Comput Syst 108:1267\u20131286","journal-title":"Futur Gener Comput Syst"},{"key":"1328_CR59","unstructured":"Dodis Y, Reyzin L, Smith A (2017) In security with noisy data: On private biometrics, secure key storage and anti-counterfeiting, pp. 79\u201399. Springer-Verlag"},{"key":"1328_CR60","unstructured":"Masud M, Gaba GS, Choudhary K, Hossain MS, Alhamid MF, Muhammad G (2021) Lightweight and anonymity-preserving user authentication scheme for IoT-based healthcare. IEEE Internet Things J 1\u20131"},{"key":"1328_CR61","doi-asserted-by":"crossref","unstructured":"Burrows M, Abadi M, Needham RM (1989) A logic of authentication. Proc R Soc London A Math Phys Sci 233\u2013271","DOI":"10.1098\/rspa.1989.0125"},{"issue":"4","key":"1328_CR62","first-page":"708","volume":"15","author":"D Wang","year":"2016","unstructured":"Wang D, Wang P (2016) Two birds with one stone: Two-factor authentication with security beyond conventional bound. IEEE Trans Dependable Secure Comput 15(4):708\u2013722","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"1","key":"1328_CR63","first-page":"164","volume":"11","author":"MA Almuhaya","year":"2022","unstructured":"Almuhaya MA, Jabbar WA, Sulaiman N, Abdulmalek S (2022) A survey on LoRaWAN technology: Recent trends, opportunities. Simul Tools Future Direct Electron 11(1):164","journal-title":"Simul Tools Future Direct Electron"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-022-01328-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-022-01328-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-022-01328-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,25]],"date-time":"2022-08-25T07:26:29Z","timestamp":1661412389000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-022-01328-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,27]]},"references-count":63,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2022,9]]}},"alternative-id":["1328"],"URL":"https:\/\/doi.org\/10.1007\/s12083-022-01328-1","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2022,6,27]]},"assertion":[{"value":"15 September 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 April 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 June 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}