{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,6]],"date-time":"2025-06-06T16:36:21Z","timestamp":1749227781477,"version":"3.40.5"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T00:00:00Z","timestamp":1732665600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T00:00:00Z","timestamp":1732665600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61802134"],"award-info":[{"award-number":["61802134"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["ZQN-811"],"award-info":[{"award-number":["ZQN-811"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003392","name":"Natural Science Foundation of Fujian Province","doi-asserted-by":"publisher","award":["2020J05059"],"award-info":[{"award-number":["2020J05059"]}],"id":[{"id":"10.13039\/501100003392","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,1]]},"DOI":"10.1007\/s12083-024-01824-6","type":"journal-article","created":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T10:58:16Z","timestamp":1732705096000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Efficient anti-quantum attack batch authentication and key agreement protocol based on NTRU in VANET"],"prefix":"10.1007","volume":"18","author":[{"given":"Jingliang","family":"Wen","sequence":"first","affiliation":[]},{"given":"Changli","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Linghui","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,27]]},"reference":[{"key":"1824_CR1","doi-asserted-by":"publisher","first-page":"100411","DOI":"10.1016\/j.cosrev.2021.100411","volume":"41","author":"P Mundhe","year":"2021","unstructured":"Mundhe P, Verma S, Venkatesan S (2021) A comprehensive survey on authentication and privacy-preserving schemes in vanets. Comput Sci Rev 41:100411. https:\/\/doi.org\/10.1016\/j.cosrev.2021.100411","journal-title":"Comput Sci Rev"},{"key":"1824_CR2","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1016\/j.comnet.2018.12.018","volume":"151","author":"A Alnasser","year":"2019","unstructured":"Alnasser A, Sun H, Jiang J (2019) Cyber security challenges and solutions for v2x communications: A survey. Comput Netw 151:52\u201367. https:\/\/doi.org\/10.1016\/j.comnet.2018.12.018","journal-title":"Comput Netw"},{"issue":"6","key":"1824_CR3","doi-asserted-by":"publisher","first-page":"2985","DOI":"10.1109\/TITS.2015.2439292","volume":"16","author":"F Qu","year":"2015","unstructured":"Qu F, Wu Z, Wang F-Y, Cho W (2015) A security and privacy review of vanets. IEEE Trans Intell Transp Syst 16(6):2985\u20132996. https:\/\/doi.org\/10.1109\/TITS.2015.2439292","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"5","key":"1824_CR4","doi-asserted-by":"publisher","first-page":"950","DOI":"10.1049\/cje.2016.08.027","volume":"25","author":"Y Xie","year":"2016","unstructured":"Xie Y, Wu L, Zhang Y, Shen J (2016) Efficient and secure authentication scheme with conditional privacy-preserving for vanets. Chin J Electron 25(5):950\u2013956. https:\/\/doi.org\/10.1049\/cje.2016.08.027","journal-title":"Chin J Electron"},{"key":"1824_CR5","doi-asserted-by":"publisher","unstructured":"Hoffstein J, Pipher J, Silverman JH (2006) Ntru: A ring-based public key cryptosystem. In: Algorithmic Number Theory: Third International Symposiun, ANTS-III Portland, Oregon, USA, June 21\u201325, 1998 Proceedings. Springer, Berlin, Heidelberg, pp 267\u2013288. https:\/\/doi.org\/10.1007\/BFb0054868","DOI":"10.1007\/BFb0054868"},{"key":"1824_CR6","doi-asserted-by":"publisher","unstructured":"Jha R, Saini AK (2011) A comparative analysis & enhancement of ntru algorithm for network security and performance improvement. In: 2011 International Conference on Communication Systems and Network Technologies. IEEE, pp 80\u201384. https:\/\/doi.org\/10.1109\/CSNT.2011.23","DOI":"10.1109\/CSNT.2011.23"},{"issue":"3","key":"1824_CR7","doi-asserted-by":"publisher","first-page":"1385","DOI":"10.1007\/s12083-022-01297-5","volume":"15","author":"J Ren","year":"2022","unstructured":"Ren J, Cheng Y, Xu S (2022) Edppa: An efficient distance-based privacy preserving authentication protocol in vanet. Peer-to-Peer Netw Appl 15(3):1385\u20131397. https:\/\/doi.org\/10.1007\/s12083-022-01297-5","journal-title":"Peer-to-Peer Netw Appl"},{"key":"1824_CR8","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2022.3204582","author":"X Zhou","year":"2022","unstructured":"Zhou X, He D, Khan MK, Wu W, Choo K-KR (2022) An efficient blockchain-based conditional privacy-preserving authentication protocol for vanets. IEEE Trans Veh Technol. https:\/\/doi.org\/10.1109\/TVT.2022.3204582","journal-title":"IEEE Trans Veh Technol"},{"key":"1824_CR9","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3236699","author":"Y Zhou","year":"2023","unstructured":"Zhou Y, Cao L, Qiao Z, Xia Z, Yang B, Zhang M, Zhang W (2023) An efficient identity authentication scheme with dynamic anonymity for vanets. IEEE Internet Things J. https:\/\/doi.org\/10.1109\/JIOT.2023.3236699","journal-title":"IEEE Internet Things J"},{"issue":"4","key":"1824_CR10","doi-asserted-by":"publisher","first-page":"3456","DOI":"10.1109\/TVT.2021.3064337","volume":"70","author":"W Xiong","year":"2021","unstructured":"Xiong W, Wang R, Wang Y, Zhou F, Luo X (2021) Cppa-d: efficient conditional privacy-preserving authentication scheme with double-insurance in vanets. IEEE Trans Veh Technol 70(4):3456\u20133468. https:\/\/doi.org\/10.1109\/TVT.2021.3064337","journal-title":"IEEE Trans Veh Technol"},{"issue":"2","key":"1824_CR11","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1007\/s12083-022-01425-1","volume":"16","author":"MA Akram","year":"2023","unstructured":"Akram MA, Mian AN, Kumari S (2023) Fog-based low latency and lightweight authentication protocol for vehicular communication. Peer-to-Peer Netw Appl 16(2):629\u2013643. https:\/\/doi.org\/10.1007\/s12083-022-01425-1","journal-title":"Peer-to-Peer Netw Appl"},{"issue":"3","key":"1824_CR12","doi-asserted-by":"publisher","first-page":"1818","DOI":"10.1109\/TDSC.2022.3164740","volume":"20","author":"C Lin","year":"2023","unstructured":"Lin C, Huang X, He D (2023) Ebcpa: Efficient blockchain-based conditional privacy-preserving authentication for vanets. IEEE Trans Dependable Secure Comput 20(3):1818\u20131832. https:\/\/doi.org\/10.1109\/TDSC.2022.3164740","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"1824_CR13","doi-asserted-by":"publisher","first-page":"100414","DOI":"10.1016\/j.vehcom.2021.100414","volume":"34","author":"B Samra","year":"2022","unstructured":"Samra B, Fouzi S (2022) New efficient certificateless scheme-based conditional privacy preservation authentication for applications in vanet. Veh Commun 34:100414. https:\/\/doi.org\/10.1016\/j.vehcom.2021.100414","journal-title":"Veh Commun"},{"key":"1824_CR14","doi-asserted-by":"publisher","unstructured":"Wu A, Guo Y, Guo Y (2023) A decentralized lightweight blockchain-based authentication mechanism for internet of vehicles. Peer-to-Peer Netw Appl 1\u201314. https:\/\/doi.org\/10.1007\/s12083-022-01442-0","DOI":"10.1007\/s12083-022-01442-0"},{"key":"1824_CR15","doi-asserted-by":"publisher","unstructured":"Yan X, Li W, Li P, Wang J, Hao X, Gong P (2013) A secure biometrics-based authentication scheme for telecare medicine information systems. J Med Syst 37(5):9972. https:\/\/doi.org\/10.1007\/s10916-013-9972-1. Accessed 2023-09-04","DOI":"10.1007\/s10916-013-9972-1"},{"key":"1824_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-014-0024-2","volume":"38","author":"D Mishra","year":"2014","unstructured":"Mishra D, Mukhopadhyay S, Chaturvedi A, Kumari S, Khan MK (2014) Cryptanalysis and improvement of Yan et al.\u2019s biometric-based authentication scheme for telecare medicine information systems. J Med Syst 38:1\u201312. https:\/\/doi.org\/10.1007\/s10916-014-0024-2","journal-title":"J Med Syst"},{"issue":"8","key":"1824_CR17","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1007\/s10916-015-0258-7","volume":"39","author":"R Amin","year":"2015","unstructured":"Amin R, Biswas G (2015) A secure three-factor user authentication and key agreement protocol for tmis with user anonymity. J Med Syst 39(8):78. https:\/\/doi.org\/10.1007\/s10916-015-0258-7","journal-title":"J Med Syst"},{"key":"1824_CR18","doi-asserted-by":"publisher","unstructured":"Zhang C, Lu R, Lin X, Ho P-H, Shen X (2008) An efficient identity-based batch verification scheme for vehicular sensor networks. In: IEEE INFOCOM 2008-The 27th Conference on Computer Communications. IEEE, pp 246\u2013250. https:\/\/doi.org\/10.1109\/INFOCOM.2008.58","DOI":"10.1109\/INFOCOM.2008.58"},{"key":"1824_CR19","doi-asserted-by":"publisher","first-page":"1441","DOI":"10.1007\/s11276-013-0543-7","volume":"19","author":"C-C Lee","year":"2013","unstructured":"Lee C-C, Lai Y-M (2013) Toward a secure batch verification with group testing for vanet. Wireless Netw 19:1441\u20131449. https:\/\/doi.org\/10.1007\/s11276-013-0543-7","journal-title":"Wireless Netw"},{"issue":"4","key":"1824_CR20","doi-asserted-by":"publisher","first-page":"3235","DOI":"10.1109\/TVT.2015.2406877","volume":"66","author":"S-F Tzeng","year":"2015","unstructured":"Tzeng S-F, Horng S-J, Li T, Wang X, Huang P-H, Khan MK (2015) Enhancing security and privacy for identity-based batch verification scheme in vanets. IEEE Trans Veh Technol 66(4):3235\u20133248. https:\/\/doi.org\/10.1109\/TVT.2015.2406877","journal-title":"IEEE Trans Veh Technol"},{"issue":"9","key":"1824_CR21","doi-asserted-by":"publisher","first-page":"2467","DOI":"10.1109\/TITS.2016.2634623","volume":"18","author":"M Azees","year":"2017","unstructured":"Azees M, Vijayakumar P, Deboarh LJ (2017) Eaap: Efficient anonymous authentication with conditional privacy-preserving scheme for vehicular ad hoc networks. IEEE Trans Intell Transp Syst 18(9):2467\u20132476. https:\/\/doi.org\/10.1109\/TITS.2016.2634623","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"2","key":"1824_CR22","doi-asserted-by":"publisher","first-page":"1278","DOI":"10.1109\/TVT.2021.3050399","volume":"70","author":"I Ali","year":"2021","unstructured":"Ali I, Chen Y, Ullah N, Kumar R, He W (2021) An efficient and provably secure ecc-based conditional privacy-preserving authentication for vehicle-to-vehicle communication in vanets. IEEE Trans Veh Technol 70(2):1278\u20131291. https:\/\/doi.org\/10.1109\/TVT.2021.3050399","journal-title":"IEEE Trans Veh Technol"},{"key":"1824_CR23","doi-asserted-by":"publisher","first-page":"100535","DOI":"10.1016\/j.vehcom.2022.100535","volume":"38","author":"J Qi","year":"2022","unstructured":"Qi J, Gao T, Deng X, Zhao C (2022) A pseudonym-based certificateless privacy-preserving authentication scheme for vanets. Veh Commun 38:100535. https:\/\/doi.org\/10.1016\/j.vehcom.2022.100535","journal-title":"Veh Commun"},{"key":"1824_CR24","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.vehcom.2017.02.006","volume":"9","author":"P Mohit","year":"2017","unstructured":"Mohit P, Amin R, Biswas G (2017) Design of authentication protocol for wireless sensor network-based smart vehicular system. Veh Commun 9:64\u201371. https:\/\/doi.org\/10.1016\/j.vehcom.2017.02.006","journal-title":"Veh Commun"},{"key":"1824_CR25","doi-asserted-by":"publisher","first-page":"70473","DOI":"10.1109\/ACCESS.2018.2880984","volume":"6","author":"X Liu","year":"2018","unstructured":"Liu X, Zhang R (2018) A robust authentication scheme with continuously updated information for vehicular sensor networks. IEEE Access. 6:70473\u201370486. https:\/\/doi.org\/10.1109\/ACCESS.2018.2880984","journal-title":"IEEE Access."},{"issue":"4","key":"1824_CR26","doi-asserted-by":"publisher","first-page":"1015","DOI":"10.1109\/TITS.2015.2492981","volume":"17","author":"P Vijayakumar","year":"2016","unstructured":"Vijayakumar P, Azees M, Kannan A, Jegatha Deborah L (2016) Dual authentication and key management techniques for secure data transmission in vehicular ad hoc networks. IEEE Trans Intell Transp Syst 17(4):1015\u20131028. https:\/\/doi.org\/10.1109\/TITS.2015.2492981","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"10","key":"1824_CR27","doi-asserted-by":"publisher","first-page":"2740","DOI":"10.1109\/TITS.2017.2657649","volume":"18","author":"Y Liu","year":"2017","unstructured":"Liu Y, Wang Y, Chang G (2017) Efficient privacy-preserving dual authentication and key agreement scheme for secure v2v communications in an iov paradigm. IEEE Trans Intell Transp Syst 18(10):2740\u20132749. https:\/\/doi.org\/10.1109\/TITS.2017.2657649","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"5","key":"1824_CR28","doi-asserted-by":"publisher","first-page":"8065","DOI":"10.1109\/JIOT.2019.2902840","volume":"6","author":"M Ma","year":"2019","unstructured":"Ma M, He D, Wang H, Kumar N, Choo K-KR (2019) An efficient and provably secure authenticated key agreement protocol for fog-based vehicular ad-hoc networks. IEEE Internet Things J 6(5):8065\u20138075. https:\/\/doi.org\/10.1109\/JIOT.2019.2902840","journal-title":"IEEE Internet Things J"},{"issue":"1","key":"1824_CR29","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1109\/TDSC.2021.3135016","volume":"20","author":"L Wei","year":"2023","unstructured":"Wei L, Cui J, Zhong H, Bolodurina I, Liu L (2023) A lightweight and conditional privacy-preserving authenticated key agreement scheme with multi-ta model for fog-based vanets. IEEE Trans Dependable Secure Comput 20(1):422\u2013436. https:\/\/doi.org\/10.1109\/TDSC.2021.3135016","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"1824_CR30","doi-asserted-by":"publisher","first-page":"1681","DOI":"10.1109\/TIFS.2020.3040876","volume":"16","author":"L Wei","year":"2020","unstructured":"Wei L, Cui J, Xu Y, Cheng J, Zhong H (2020) Secure and lightweight conditional privacy-preserving authentication for securing traffic emergency messages in vanets. IEEE Trans Inf Forensics Secur 16:1681\u20131695. https:\/\/doi.org\/10.1109\/TIFS.2020.3040876","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"1824_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2020\/2637916","volume":"2020","author":"Y Zhou","year":"2020","unstructured":"Zhou Y, Wang L (2020) A lattice-based authentication scheme for roaming service in ubiquitous networks with anonymity. Secur Commun Netw 2020:1\u201319. https:\/\/doi.org\/10.1155\/2020\/2637916","journal-title":"Secur Commun Netw"},{"key":"1824_CR32","doi-asserted-by":"publisher","unstructured":"Jeong S, Park K, Park Y, Park Y (2019) An efficient ntru-based authentication protocol in iot environment. In: Intelligent Computing: Proceedings of the 2018 Computing Conference, vol. 2. Springer, pp 1262\u20131268. https:\/\/doi.org\/10.1007\/978-3-030-01177-2_91","DOI":"10.1007\/978-3-030-01177-2_91"},{"issue":"3","key":"1824_CR33","doi-asserted-by":"publisher","first-page":"1057","DOI":"10.1016\/j.patcog.2006.05.030","volume":"40","author":"A Lumini","year":"2007","unstructured":"Lumini A, Nanni L (2007) An improved biohashing for human authentication. Pattern Recogn 40(3):1057\u20131065. https:\/\/doi.org\/10.1016\/j.patcog.2006.05.030","journal-title":"Pattern Recogn"},{"key":"1824_CR34","doi-asserted-by":"publisher","unstructured":"Dolev D, Yao A (1983) On the security of public key protocols. IEEE Trans Inf Theory 29(2):198\u2013208. https:\/\/doi.org\/10.1109\/TIT.1983.1056650","DOI":"10.1109\/TIT.1983.1056650"},{"issue":"12","key":"1824_CR35","doi-asserted-by":"publisher","first-page":"2854","DOI":"10.3390\/s17122854","volume":"17","author":"Y Zhou","year":"2017","unstructured":"Zhou Y, Zhao X, Jiang Y, Shang F, Deng S, Wang X (2017) An enhanced privacy-preserving authentication scheme for vehicle sensor networks. Sensors. 17(12):2854. https:\/\/doi.org\/10.3390\/s17122854","journal-title":"Sensors."},{"key":"1824_CR36","doi-asserted-by":"publisher","unstructured":"Zheng X, Huang C-T, Matthews M (2007) Chinese remainder theorem based group key management. In: Proceedings of the 45th Annual Southeast Regional Conference. pp 266\u2013271. https:\/\/doi.org\/10.1145\/1233341.1233389","DOI":"10.1145\/1233341.1233389"},{"key":"1824_CR37","doi-asserted-by":"publisher","unstructured":"Zhou J, Ou Y-H (2009) Key tree and chinese remainder theorem based group key distribution scheme. In: Algorithms and Architectures for Parallel Processing: 9th International Conference, ICA3PP 2009, Taipei, Taiwan, June 8-11, 2009. Proceedings 9. Springer, pp 254\u2013265. https:\/\/doi.org\/10.1007\/978-3-642-03095-6_26","DOI":"10.1007\/978-3-642-03095-6_26"},{"issue":"3","key":"1824_CR38","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1049\/iet-ifs.2012.0352","volume":"8","author":"P Vijayakumar","year":"2014","unstructured":"Vijayakumar P, Bose S, Kannan A (2014) Chinese remainder theorem based centralised group key management for secure multicast communication. IET Inf Secur 8(3):179\u2013187. https:\/\/doi.org\/10.1049\/iet-ifs.2012.0352","journal-title":"IET Inf Secur"},{"key":"1824_CR39","doi-asserted-by":"publisher","unstructured":"Dang QH (2015). Secure hash standard. https:\/\/doi.org\/10.6028\/NIST.FIPS.180-4","DOI":"10.6028\/NIST.FIPS.180-4"},{"issue":"1","key":"1824_CR40","doi-asserted-by":"publisher","first-page":"87","DOI":"10.13868\/j.cnki.jcr.000352","volume":"7","author":"T Yang","year":"2020","unstructured":"Yang T, Zhang G, Liu L, Zhang Y (2020) A survey on authentication protocols for internet of things. J Cryptol Res 7(1):87\u2013101. https:\/\/doi.org\/10.13868\/j.cnki.jcr.000352","journal-title":"J Cryptol Res"},{"key":"1824_CR41","doi-asserted-by":"publisher","unstructured":"Abdalla M, Fouque P-A, Pointcheval D (2005) Password-based authenticated key exchange in the three-party setting. In: Public Key Cryptography-PKC 2005: 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005. Proceedings 8. Springer, pp 65\u201384. https:\/\/doi.org\/10.1007\/978-3-540-30580-4_6","DOI":"10.1007\/978-3-540-30580-4_6"},{"key":"1824_CR42","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/CSFW.2001.930138","volume":"1","author":"B Blanchet","year":"2001","unstructured":"Blanchet B et al (2001) An efficient cryptographic protocol verifier based on prolog rules. Csfw 1:82\u201396. https:\/\/doi.org\/10.1109\/CSFW.2001.930138","journal-title":"Csfw"},{"issue":"1","key":"1824_CR43","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M Burrows","year":"1990","unstructured":"Burrows M, Abadi M, Needham R (1990) A logic of authentication. ACM Trans Comput Syst 8(1):18\u201336. https:\/\/doi.org\/10.1145\/77648.77649","journal-title":"ACM Trans Comput Syst"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01824-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-024-01824-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01824-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,17]],"date-time":"2025-05-17T09:32:57Z","timestamp":1747474377000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-024-01824-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,27]]},"references-count":43,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1]]}},"alternative-id":["1824"],"URL":"https:\/\/doi.org\/10.1007\/s12083-024-01824-6","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2024,11,27]]},"assertion":[{"value":"13 September 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 October 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 November 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"This article does not contain any studies with human We affirm that the writing and research work for this paper is conducted with objectivity and integrity, aiming to provide a valuable contribution to the academic and scientifc community. If necessary we are willing to provide additional information to fully disclose any interests and potential conflicts.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}}],"article-number":"21"}}