{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:05:22Z","timestamp":1775912722397,"version":"3.50.1"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2025,1,29]],"date-time":"2025-01-29T00:00:00Z","timestamp":1738108800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,29]],"date-time":"2025-01-29T00:00:00Z","timestamp":1738108800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100007129","name":"Natural Science Foundation of Shandong Province","doi-asserted-by":"publisher","award":["ZR202111230202"],"award-info":[{"award-number":["ZR202111230202"]}],"id":[{"id":"10.13039\/501100007129","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007129","name":"Natural Science Foundation of Shandong Province","doi-asserted-by":"publisher","award":["ZR202111230202"],"award-info":[{"award-number":["ZR202111230202"]}],"id":[{"id":"10.13039\/501100007129","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,3]]},"DOI":"10.1007\/s12083-024-01839-z","type":"journal-article","created":{"date-parts":[[2025,1,29]],"date-time":"2025-01-29T06:47:33Z","timestamp":1738133253000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["An enhanced three-factor based authentication and key agreement protocol using PUF in IoMT"],"prefix":"10.1007","volume":"18","author":[{"given":"Tsu-Yang","family":"Wu","sequence":"first","affiliation":[]},{"given":"Haozhi","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Saru","family":"Kumari","sequence":"additional","affiliation":[]},{"given":"Chien-Ming","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,29]]},"reference":[{"issue":"05","key":"1839_CR1","doi-asserted-by":"crossref","first-page":"164","DOI":"10.4236\/jcc.2015.35021","volume":"3","author":"S Madakam","year":"2015","unstructured":"Madakam S, Lake V, Lake V, Lake V et al (2015) Internet of things (iot): A literature review. J Comput Commun 3(05):164","journal-title":"J Comput Commun"},{"key":"1839_CR2","doi-asserted-by":"crossref","unstructured":"Chien H-Y, Ciou P-P (2023) Design and implementation of efficient iot authentication schemes for mqtt 5.0. J Int Technol 24(3):665\u2013674","DOI":"10.53106\/160792642023052403012"},{"issue":"4","key":"1839_CR3","first-page":"1426","volume":"8","author":"D-F Zhou","year":"2023","unstructured":"Zhou D-F, Gan S-J, Cui Y, Virrokni MX (2023) Automated plant light replenishment control based population intelligence algorithms in agricultural iot environment. J Netw Intell 8(4):1426\u20131439","journal-title":"J Netw Intell"},{"key":"1839_CR4","unstructured":"UNDESA, Nations PDU, Economic D, Affairs S (2013) World population ageing 2013. Mediterranean J Soc Sci"},{"key":"1839_CR5","volume":"60","author":"VJ Aski","year":"2023","unstructured":"Aski VJ, Dhaka VS, Parashar A, Rida I et al (2023) Internet of things in healthcare: A survey on protocol standards, enabling technologies, wban architectures and open issues. Phys Commun 60:102103","journal-title":"Phys Commun"},{"issue":"17","key":"1839_CR6","doi-asserted-by":"crossref","first-page":"3701","DOI":"10.3390\/math11173701","volume":"11","author":"T-Y Wu","year":"2023","unstructured":"Wu T-Y, Wang L, Chen C-M (2023) Enhancing the security: A lightweight authentication and key agreement protocol for smart medical services in the ioht. Mathematics 11(17):3701","journal-title":"Mathematics"},{"issue":"1","key":"1839_CR7","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1109\/MNET.103.2000761","volume":"36","author":"B Cornet","year":"2022","unstructured":"Cornet B, Fang H, Ngo H, Boyer EW, Wang H (2022) An overview of wireless body area networks for mobile health applications. IEEE Netw 36(1):76\u201382","journal-title":"IEEE Netw"},{"key":"1839_CR8","doi-asserted-by":"crossref","first-page":"105101","DOI":"10.1109\/ACCESS.2021.3099299","volume":"9","author":"Y Wang","year":"2021","unstructured":"Wang Y, Liu W, Li B (2021) An improved authentication protocol for smart healthcare system using wireless medical sensor network. IEEE Access 9:105101\u2013105117","journal-title":"IEEE Access"},{"key":"1839_CR9","doi-asserted-by":"crossref","first-page":"429","DOI":"10.1016\/j.comnet.2017.03.013","volume":"129","author":"X Li","year":"2017","unstructured":"Li X, Ibrahim MH, Kumari S, Sangaiah AK, Gupta V, Choo K-KR (2017) Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks. Comput Netw 129:429\u2013443","journal-title":"Comput Netw"},{"key":"1839_CR10","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1016\/j.comcom.2020.06.010","volume":"160","author":"A Gupta","year":"2020","unstructured":"Gupta A, Tripathi M, Sharma A (2020) A provably secure and efficient anonymous mutual authentication and key agreement protocol for wearable devices in wban. Comput Commun 160:311\u2013325","journal-title":"Comput Commun"},{"key":"1839_CR11","doi-asserted-by":"crossref","unstructured":"Wu X, Xu J, Huang W, Jian W (2020) A new mutual authentication and key agreement protocol in wireless body area network. In: 2020 IEEE International conference on smart cloud (SmartCloud), IEEE, pp 199\u2013203","DOI":"10.1109\/SmartCloud49737.2020.00045"},{"key":"1839_CR12","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1016\/j.comnet.2018.11.021","volume":"149","author":"A Gupta","year":"2019","unstructured":"Gupta A, Tripathi M, Shaikh TJ, Sharma A (2019) A lightweight anonymous user authentication and key establishment scheme for wearable devices. Comput Netw 149:29\u201342","journal-title":"Comput Netw"},{"key":"1839_CR13","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2020.107567","volume":"183","author":"R Hajian","year":"2020","unstructured":"Hajian R, ZakeriKia S, Erfani SH, Mirabi M (2020) Shaparak: Scalable healthcare authentication protocol with attack-resilience and anonymous key-agreement. Comput Netw 183:107567","journal-title":"Comput Netw"},{"key":"1839_CR14","doi-asserted-by":"crossref","first-page":"60534","DOI":"10.1109\/ACCESS.2022.3181182","volume":"10","author":"S Yu","year":"2022","unstructured":"Yu S, Park K (2022) Sals-tmis: Secure, anonymous, and lightweight privacy-preserving scheme for iomt-enabled tmis environments. IEEE Access 10:60534\u201360549","journal-title":"IEEE Access"},{"key":"1839_CR15","doi-asserted-by":"crossref","DOI":"10.1016\/j.cmpb.2019.105054","volume":"182","author":"P Soni","year":"2019","unstructured":"Soni P, Pal AK, Islam SH (2019) An improved three-factor authentication scheme for patient monitoring using wsn in remote health-care system. Comput Methods Programs Biomed 182:105054","journal-title":"Comput Methods Programs Biomed"},{"key":"1839_CR16","doi-asserted-by":"crossref","first-page":"534","DOI":"10.1016\/j.compeleceng.2017.08.003","volume":"69","author":"S Challa","year":"2018","unstructured":"Challa S, Das AK, Odelu V, Kumar N, Kumari S, Khan MK, Vasilakos AV (2018) An efficient ecc-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks. Comput Elec Eng 69:534\u2013554","journal-title":"Comput Elec Eng"},{"issue":"1","key":"1839_CR17","first-page":"317","volume":"134","author":"T-Y Wu","year":"2023","unstructured":"Wu T-Y, Meng Q, Yang L, Kumari S, Pirouz M (2023) Amassing the security: An enhanced authentication and key agreement protocol for remote surgery in healthcare environment. Comput Model Eng Sci 134(1):317\u2013341","journal-title":"Comput Model Eng Sci"},{"key":"1839_CR18","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1186\/s13638-023-02245-4","volume":"1","author":"T-Y Wu","year":"2023","unstructured":"Wu T-Y, Kong F, Meng Q, Kumari S (2023) Chen C-M (2023) Rotating behind security: an enhanced authentication protocol for iot-enabled devices in distributed cloud computing architecture. EURASIP J Wireless Commun Netw 1:36","journal-title":"EURASIP J Wireless Commun Netw"},{"key":"1839_CR19","doi-asserted-by":"crossref","first-page":"47282","DOI":"10.1109\/ACCESS.2020.2978891","volume":"8","author":"G Xu","year":"2020","unstructured":"Xu G, Wang F, Zhang M, Peng J (2020) Efficient and provably secure anonymous user authentication scheme for patient monitoring using wireless medical sensor networks. IEEE Access 8:47282\u201347294","journal-title":"IEEE Access"},{"issue":"18","key":"1839_CR20","doi-asserted-by":"crossref","first-page":"7075","DOI":"10.3390\/s22187075","volume":"22","author":"J Lee","year":"2022","unstructured":"Lee J, Oh J, Kwon D, Kim M, Yu S, Jho N-S, Park Y (2022) Puftap-iot: Puf-based three-factor authentication protocol in iot environment focused on sensing devices. Sensors 22(18):7075","journal-title":"Sensors"},{"key":"1839_CR21","doi-asserted-by":"crossref","first-page":"125739","DOI":"10.1109\/ACCESS.2021.3111292","volume":"9","author":"Z Jiang","year":"2021","unstructured":"Jiang Z, Liu W, Ma R, Shirazi SH, Xie Y (2021) Lightweight healthcare wireless body area network scheme with amplified security. IEEE Access 9:125739\u2013125752","journal-title":"IEEE Access"},{"issue":"3","key":"1839_CR22","doi-asserted-by":"crossref","first-page":"4535","DOI":"10.1109\/JSYST.2019.2963235","volume":"14","author":"M Kaveh","year":"2020","unstructured":"Kaveh M, Mosavi MR (2020) A lightweight mutual authentication for smart grid neighborhood area network communications based on physically unclonable function. IEEE Syst J 14(3):4535\u20134544","journal-title":"IEEE Syst J"},{"issue":"1","key":"1839_CR23","doi-asserted-by":"crossref","first-page":"48","DOI":"10.3390\/math11010048","volume":"11","author":"M Safkhani","year":"2022","unstructured":"Safkhani M, Bagheri N, Ali S, Hussain Malik M, Hassan Ahmed O, Hosseinzadeh M, Mosavi AH (2022) Improvement and cryptanalysis of a physically unclonable functions based authentication scheme for smart grids. Mathematics 11(1):48","journal-title":"Mathematics"},{"key":"1839_CR24","doi-asserted-by":"crossref","unstructured":"Alladi T, Chamola V, et al (2020) Harci: A two-way authentication protocol for three entity healthcare iot networks. IEEE J Selected Areas Commun 39(2):361\u2013369","DOI":"10.1109\/JSAC.2020.3020605"},{"issue":"11","key":"1839_CR25","doi-asserted-by":"crossref","first-page":"20457","DOI":"10.1109\/JIOT.2024.3371101","volume":"11","author":"D Wang","year":"2024","unstructured":"Wang D, Cao Y, Lam K-Y, Hu Y, Kaiwartya O (2024) Authentication and key agreement based on three factors and puf for uavs-assisted post-disaster emergency communication. IEEE Int Things J 11(11):20457\u201320472","journal-title":"IEEE Int Things J"},{"issue":"5","key":"1839_CR26","doi-asserted-by":"crossref","first-page":"3484","DOI":"10.1109\/TII.2021.3097759","volume":"18","author":"J Subramani","year":"2021","unstructured":"Subramani J, Maria A, Rajasekaran AS, Al-Turjman F (2021) Lightweight privacy and confidentiality preserving anonymous authentication scheme for wbans. IEEE Trans Industrial Inf 18(5):3484\u20133491","journal-title":"IEEE Trans Industrial Inf"},{"issue":"9","key":"1839_CR27","doi-asserted-by":"crossref","first-page":"16243","DOI":"10.1109\/JIOT.2024.3355228","volume":"11","author":"Y Han","year":"2024","unstructured":"Han Y, Guo H, Liu J, Ehui BB, Wu Y, Li S (2024) An enhanced multi-factor authentication and key agreement protocol in industrial internet of things. IEEE Int Things J 11(9):16243\u201316254","journal-title":"IEEE Int Things J"},{"issue":"17","key":"1839_CR28","doi-asserted-by":"crossref","first-page":"15087","DOI":"10.1109\/JIOT.2023.3264565","volume":"10","author":"SS Sahoo","year":"2023","unstructured":"Sahoo SS, Mohanty S, Sahoo KS, Daneshmand M, Gandomi AH (2023) A three factor based authentication scheme of 5g wireless sensor networks for iot system. IEEE Int Things J 10(17):15087\u201315099","journal-title":"IEEE Int Things J"},{"issue":"1","key":"1839_CR29","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1109\/JIOT.2018.2849324","volume":"6","author":"B Chatterjee","year":"2018","unstructured":"Chatterjee B, Das D, Maity S, Sen S (2018) Rf-puf: Enhancing iot security through authentication of wireless nodes using in-situ machine learning. IEEE Int Things J 6(1):388\u2013398","journal-title":"IEEE Int Things J"},{"issue":"1","key":"1839_CR30","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1109\/JIOT.2018.2837751","volume":"6","author":"D Choi","year":"2018","unstructured":"Choi D, Seo S-H, Oh Y-S, Kang Y (2018) Two-factor fuzzy commitment for unmanned iot devices security. IEEE Int Things J 6(1):335\u2013348","journal-title":"IEEE Int Things J"},{"issue":"5","key":"1839_CR31","first-page":"1055","volume":"24","author":"Y Zhou","year":"2023","unstructured":"Zhou Y, Yang B, Liu D (2023) Lightweight and anonymous group authentication scheme based on puf in the smart grid. J Int Technol 24(5):1055\u20131065","journal-title":"J Int Technol"},{"issue":"3","key":"1839_CR32","doi-asserted-by":"crossref","first-page":"1122","DOI":"10.3390\/s23031122","volume":"23","author":"K Kim","year":"2023","unstructured":"Kim K, Ryu J, Lee Y, Won D (2023) An improved lightweight user authentication scheme for the internet of medical things. Sensors 23(3):1122","journal-title":"Sensors"},{"issue":"4","key":"1839_CR33","doi-asserted-by":"crossref","first-page":"2649","DOI":"10.1109\/JIOT.2021.3080461","volume":"9","author":"M Masud","year":"2021","unstructured":"Masud M, Gaba GS, Choudhary K, Hossain MS, Alhamid MF, Muhammad G (2021) Lightweight and anonymity-preserving user authentication scheme for iot-based healthcare. IEEE Int Things J 9(4):2649\u20132656","journal-title":"IEEE Int Things J"},{"issue":"2","key":"1839_CR34","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev D, Yao A (1983) On the security of public key protocols. IEEE Trans Inf Theory 29(2):198\u2013208","journal-title":"IEEE Trans Inf Theory"},{"key":"1839_CR35","doi-asserted-by":"crossref","unstructured":"Canetti R, Krawczyk H (2001) Analysis of key-exchange protocols and their use for building secure channels. In: International conference on the theory and applications of cryptographic techniques, Springer, pp 453\u2013474","DOI":"10.1007\/3-540-44987-6_28"},{"issue":"23","key":"1839_CR36","doi-asserted-by":"crossref","first-page":"3868","DOI":"10.3390\/electronics11233868","volume":"11","author":"S Lee","year":"2022","unstructured":"Lee S, Kim S, Yu S, Jho N, Park Y (2022) Provably secure puf-based lightweight mutual authentication scheme for wireless body area networks. Electronics 11(23):3868","journal-title":"Electronics"},{"key":"1839_CR37","first-page":"66","volume":"1","author":"AG Reddy","year":"2023","unstructured":"Reddy AG, Babu PR, Odelu V, Wang L, Kumar SA (2023) V2g-auth: Lightweight authentication and key agreement protocol for v2g environment leveraging physically unclonable functions. IEEE Trans Indust Cyber-Phys Syst 1:66\u201378","journal-title":"IEEE Trans Indust Cyber-Phys Syst"},{"key":"1839_CR38","doi-asserted-by":"crossref","unstructured":"Abdalla M, Fouque P-A, Pointcheval D (2005) Password-based authentication key exchange in the three-party setting. In: Public Key Cryptography-PKC 2005: 8th International Workshop on Theory and practice in public key cryptography, Les Diablerets, Switzerland, January 23-26, 2005. Proceedings 8, Springer, pp 65\u201384","DOI":"10.1007\/978-3-540-30580-4_6"},{"issue":"9","key":"1839_CR39","doi-asserted-by":"crossref","first-page":"2123","DOI":"10.3390\/math11092123","volume":"11","author":"T-Y Wu","year":"2023","unstructured":"Wu T-Y, Meng Q, Chen Y-C, Kumari S, Chen C-M (2023) Toward a secure smart-home iot access control scheme based on home registration approach. Mathematics 11(9):2123","journal-title":"Mathematics"},{"key":"1839_CR40","doi-asserted-by":"crossref","unstructured":"Armando A, Basin D, Boichut Y, Chevalier Y, Compagna L, Cu\u00e9llar J, Drielsma P.H, H\u00e9am P.-C, Kouchnarenko O, Mantovani J, et al (2005) The avispa tool for the automated validation of internet security protocols and applications. In: Computer aided verification: 17th international conference, CAV 2005, Edinburgh, Scotland, UK, July 6-10, 2005. Proceedings 17, Springer, pp 281\u2013285","DOI":"10.1007\/11513988_27"},{"issue":"11","key":"1839_CR41","doi-asserted-by":"crossref","first-page":"2776","DOI":"10.1109\/TIFS.2017.2721359","volume":"12","author":"D Wang","year":"2017","unstructured":"Wang D, Cheng H, Wang P, Huang X, Jian G (2017) Zipf\u2019s law in passwords. IEEE Trans Inf Forensics Sec 12(11):2776\u20132791","journal-title":"IEEE Trans Inf Forensics Sec"},{"issue":"3","key":"1839_CR42","first-page":"734","volume":"7","author":"M Ge","year":"2022","unstructured":"Ge M, Kumari S, Chen C-M (2022) Authpfs: a method to verify perfect forward secrecy in authentication protocols. J Netw Intell 7(3):734\u2013750","journal-title":"J Netw Intell"},{"key":"1839_CR43","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/s40860-019-00079-w","volume":"6","author":"S Suganthi","year":"2020","unstructured":"Suganthi S, Anitha R, Sureshkumar V, Harish S, Agalya S (2020) End to end light weight mutual authentication scheme in iot-based healthcare environment. J Reliable Intell Environ 6:3\u201313","journal-title":"J Reliable Intell Environ"},{"key":"1839_CR44","doi-asserted-by":"crossref","first-page":"11511","DOI":"10.1109\/ACCESS.2022.3145959","volume":"10","author":"J Ryu","year":"2022","unstructured":"Ryu J, Oh J, Kwon D, Son S, Lee J, Park Y, Park Y (2022) Secure ecc-based three-factor mutual authentication protocol for telecare medical information system. IEEE Access 10:11511\u201311526","journal-title":"IEEE Access"},{"issue":"11","key":"1839_CR45","doi-asserted-by":"crossref","first-page":"8205","DOI":"10.1109\/JIOT.2022.3142084","volume":"9","author":"P Mall","year":"2022","unstructured":"Mall P, Amin R, Das AK, Leung MT, Choo K-KR (2022) Puf-based authentication and key agreement protocols for iot, wsns, and smart grids: a comprehensive survey. IEEE Int Things J 9(11):8205\u20138228","journal-title":"IEEE Int Things J"},{"issue":"6","key":"1839_CR46","doi-asserted-by":"crossref","first-page":"1368","DOI":"10.3390\/electronics12061368","volume":"12","author":"J Lee","year":"2023","unstructured":"Lee J, Oh J, Park Y (2023) A secure and anonymous authentication protocol based on three-factor wireless medical sensor networks. Electronics 12(6):1368","journal-title":"Electronics"},{"key":"1839_CR47","doi-asserted-by":"crossref","first-page":"103177","DOI":"10.1016\/j.jnca.2021.103177","volume":"192","author":"AYF Alsahlani","year":"2021","unstructured":"Alsahlani AYF, Popa A (2021) Lmaas-iot: Lightweight multi-factor authentication and authorization scheme for real-time data access in iot cloud-based environment. J Netw Comput Appl 192:103177","journal-title":"J Netw Comput Appl"},{"key":"1839_CR48","doi-asserted-by":"crossref","first-page":"741","DOI":"10.1016\/j.neucom.2022.05.099","volume":"500","author":"B Hu","year":"2022","unstructured":"Hu B, Tang W, Xie Q (2022) A two-factor security authentication scheme for wireless sensor networks in iot environments. Neurocomputing 500:741\u2013749","journal-title":"Neurocomputing"},{"key":"1839_CR49","doi-asserted-by":"crossref","unstructured":"Wisiol N, Becker GT, Margraf M, Soroceanu TA, Tobisch J, Zengin B (2020) Breaking the lightweight secure puf: Understanding the relation of input transformations and machine learning resistance. In: Smart card research and advanced applications: 18th International Conference, CARDIS 2019, Prague, Czech Republic, November 11\u201313, 2019, Revised Selected Papers 18, Springer, pp 40\u201354","DOI":"10.1007\/978-3-030-42068-0_3"},{"key":"1839_CR50","doi-asserted-by":"crossref","unstructured":"Son S, Park Y, Park Y (2021) A secure, lightweight, and anonymous user authentication protocol for iot environments. Sustainability 13(16):9241","DOI":"10.3390\/su13169241"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01839-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-024-01839-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01839-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,17]],"date-time":"2025-05-17T10:03:47Z","timestamp":1747476227000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-024-01839-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,29]]},"references-count":50,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,3]]}},"alternative-id":["1839"],"URL":"https:\/\/doi.org\/10.1007\/s12083-024-01839-z","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1,29]]},"assertion":[{"value":"12 March 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 October 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 January 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflicts of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This paper does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"This manuscript is approved by all authors for publication.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}],"article-number":"83"}}