{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T13:40:23Z","timestamp":1774446023818,"version":"3.50.1"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2025,1,13]],"date-time":"2025-01-13T00:00:00Z","timestamp":1736726400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,13]],"date-time":"2025-01-13T00:00:00Z","timestamp":1736726400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,3]]},"DOI":"10.1007\/s12083-024-01890-w","type":"journal-article","created":{"date-parts":[[2025,1,13]],"date-time":"2025-01-13T21:12:20Z","timestamp":1736802740000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A privacy preserving batch audit scheme for IoT based cloud data storage"],"prefix":"10.1007","volume":"18","author":[{"given":"S. Milton","family":"Ganesh","sequence":"first","affiliation":[]},{"given":"S.","family":"Priya","sequence":"additional","affiliation":[]},{"given":"Vinayakumar","family":"Ravi","sequence":"additional","affiliation":[]},{"given":"Suliman A.","family":"Alsuhibany","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,13]]},"reference":[{"key":"1890_CR1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2023.3343437","author":"KA Shim","year":"2024","unstructured":"Shim KA (2024) A secure certificateless signature scheme for cloud-assisted industrial IoT. In IEEE Trans Ind Inform. https:\/\/doi.org\/10.1109\/TII.2023.3343437","journal-title":"In IEEE Trans Ind Inform"},{"key":"1890_CR2","doi-asserted-by":"publisher","DOI":"10.1080\/01969722.2023.2176653","author":"C Singh","year":"2023","unstructured":"Singh C, Asif Basha A, Bhushan B, Venkatesan M, Chaturvedi A, Shrivastava A (2023) A secure IoT based wireless sensor network data aggregation and dissemination system. Cybern Syst. https:\/\/doi.org\/10.1080\/01969722.2023.2176653","journal-title":"Cybern Syst"},{"key":"1890_CR3","doi-asserted-by":"publisher","unstructured":"Alka L, Rao P (2017) Platforms for big data analytics: trend towards hybrid era. In: International Conference on Energy, Communication, Data Analytics and Soft Computing. pp. 3235\u20133238. https:\/\/doi.org\/10.1109\/ICECDS.2017.8390056","DOI":"10.1109\/ICECDS.2017.8390056"},{"issue":"4","key":"1890_CR4","doi-asserted-by":"publisher","first-page":"2546","DOI":"10.1109\/COMST.2016.2582841","volume":"18","author":"NC Luong","year":"2016","unstructured":"Luong NC, Hoang DT, Wang P, Niyato D, Kim DI, Han Z (2016) Data collection and wireless communication in Internet of Things (IoT) using economic analysis and pricing models: A survey. IEEE Commun Surv Tutorials 18(4):2546\u20132590. https:\/\/doi.org\/10.1109\/COMST.2016.2582841","journal-title":"IEEE Commun Surv Tutorials"},{"issue":"1","key":"1890_CR5","doi-asserted-by":"publisher","first-page":"1253","DOI":"10.1109\/TVT.2023.3305556","volume":"73","author":"C Yan","year":"2024","unstructured":"Yan C, Wang C, Shen J, Dev K, Guizani M, Wang W (2024) Edge-assisted hierarchical batch authentication scheme for VANETs. IEEE Trans Veh Technol 73(1):1253\u20131262. https:\/\/doi.org\/10.1109\/TVT.2023.3305556","journal-title":"IEEE Trans Veh Technol"},{"issue":"18","key":"1890_CR6","doi-asserted-by":"publisher","first-page":"14248","DOI":"10.1109\/JIOT.2021.3068268","volume":"8","author":"C Wang","year":"2021","unstructured":"Wang C, Huang R, Shen J, Liu J, Vijayakumar P, Kumar N (2021) A novel lightweight authentication protocol for emergency vehicle avoidance in VANETs. IEEE Internet Things J 8(18):14248\u201314257","journal-title":"IEEE Internet Things J"},{"issue":"11","key":"1890_CR7","doi-asserted-by":"publisher","first-page":"11034","DOI":"10.3934\/mbe.2022514","volume":"19","author":"D Liu","year":"2022","unstructured":"Liu D, Li Z, Wang C, Ren Y (2022) Enabling secure mutual authentication and storage checking in cloud-assisted IoT. Math Biosci Eng 19(11):11034\u201311046","journal-title":"Math Biosci Eng"},{"key":"1890_CR8","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/j.future.2022.10.012","volume":"140","author":"C Wang","year":"2023","unstructured":"Wang C, Zhou T, Shen J, Wang W, Zhou X (2023) Searchable and secure edge pre-cache scheme for intelligent 6G wireless systems. Future Gener Comput Syst 140:129\u2013137","journal-title":"Future Gener Comput Syst"},{"issue":"1","key":"1890_CR9","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1109\/TNSE.2023.3296329","volume":"11","author":"AK Mishra","year":"2024","unstructured":"Mishra AK, Wazid M, Singh DP, Das AK, Roy S, Shetty S (2024) ACKS-IA: An access control and key agreement scheme for securing industry 4.0 applications. IEEE Trans Netw Sci Eng 11(1):254\u2013269. https:\/\/doi.org\/10.1109\/TNSE.2023.3296329","journal-title":"IEEE Trans Netw Sci Eng"},{"issue":"1","key":"1890_CR10","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1109\/MCOM.2018.1700379","volume":"56","author":"GS Aujla","year":"2018","unstructured":"Aujla GS, Chaudhary R, Kumar N, Das AK, Rodrigues JJPC (2018) SecSVA: Secure storage verification and auditing of Big Data in the cloud environment. IEEE Commun Mag 56(1):78\u201385","journal-title":"IEEE Commun Mag"},{"key":"1890_CR11","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1016\/j.future.2016.12.036","volume":"76","author":"F Li","year":"2017","unstructured":"Li F, Hong J, Omala AA (2017) Efficient certificateless access control for industrial Internet of Things. Future Gener Comput Syst 76:285\u2013292","journal-title":"Future Gener Comput Syst"},{"key":"1890_CR12","doi-asserted-by":"publisher","first-page":"691","DOI":"10.3390\/app13020691","volume":"13","author":"ZA Hussien","year":"2023","unstructured":"Hussien ZA, Abdulmalik HA, Hussain MA, Nyangaresi VO, Ma J, Abduljabbar ZA, Abduljaleel IQ (2023) Lightweight integrity preserving scheme for secure data exchange in cloud-based IoT systems Systems. Appl Sci 13:691. https:\/\/doi.org\/10.3390\/app13020691","journal-title":"Appl Sci"},{"key":"1890_CR13","doi-asserted-by":"publisher","first-page":"1717","DOI":"10.1109\/TPDS.2012.278","volume":"24","author":"K Yang","year":"2013","unstructured":"Yang K, Jia X (2013) An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Trans Parallel Distrib Syst 24:1717\u20131726","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"1","key":"1890_CR14","doi-asserted-by":"publisher","first-page":"9809874","DOI":"10.1155\/2020\/9809874","volume":"2020","author":"SM Ganesh","year":"2020","unstructured":"Ganesh SM, Manikandan SP (2020) An efficient integrity verification and authentication scheme over the remote data in the public clouds for mobile users. Secur Commun Netw 2020(1):9809874. https:\/\/doi.org\/10.1155\/2020\/9809874","journal-title":"Secur Commun Netw"},{"key":"1890_CR15","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1016\/j.jnca.2018.12.004","volume":"127","author":"H Tian","year":"2019","unstructured":"Tian H, Nan F, Chang C-C, Huang Y, Jing Lu, Yongqian Du (2019) Privacy-preserving public auditing for secure data storage in fog-to-cloud computing. J Netw Comput Appl 127:59\u201369. https:\/\/doi.org\/10.1016\/j.jnca.2018.12.004","journal-title":"J Netw Comput Appl"},{"issue":"1","key":"1890_CR16","doi-asserted-by":"publisher","first-page":"1079","DOI":"10.32604\/csse.2023.033961","volume":"46","author":"PP Nayudu","year":"2023","unstructured":"Nayudu PP, Sekhar KR (2023) Secured access policy in ciphertext-policy attribute-based encryption for cloud environment. Comput Syst Sci Eng 46(1):1079\u20131092. https:\/\/doi.org\/10.32604\/csse.2023.033961","journal-title":"Comput Syst Sci Eng"},{"issue":"4","key":"1890_CR17","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1504\/IJSSE.2023.134428","volume":"13","author":"PP Nayudu","year":"2023","unstructured":"Nayudu PP, Sekhar KR (2023) An efficient ciphertext-policy attribute-based encryption with attribute and user revocation scheme in cloud environment. Int J Syst Syst Eng 13(4):371\u2013385. https:\/\/doi.org\/10.1504\/IJSSE.2023.134428","journal-title":"Int J Syst Syst Eng"},{"key":"1890_CR18","doi-asserted-by":"publisher","unstructured":"Deswarte Y, Quisquater JJ, Sa\u00efdane A (2004) Remote integrity checking. In: Jajodia S, Strous L (eds) Integrity and Internal Control in Information Systems VI. IICIS 2003. IFIP International Federation for Information Processing, vol 140. Springer, Boston. https:\/\/doi.org\/10.1007\/1-4020-7901-X_1","DOI":"10.1007\/1-4020-7901-X_1"},{"key":"1890_CR19","unstructured":"Filho DLG, Baretto PSLM (2006) Demonstrating data possession and uncheatable data transfer. IACR ePrint archive, Report 2006\/150, http:\/\/eprint.iacr.org\/2006\/150."},{"key":"1890_CR20","first-page":"598","volume-title":"Provable data possession at untrusted stores","author":"A Guiseppe","year":"2007","unstructured":"Guiseppe A et al (2007) Provable data possession at untrusted stores. ACM Alexandria, Virginia, pp 598\u2013609"},{"key":"1890_CR21","first-page":"91","volume-title":"Scalable and efficient provable data possession","author":"G Ateniese","year":"2008","unstructured":"Ateniese G, Pietro RD, Mancini LV, Tsudik G (2008) Scalable and efficient provable data possession. ACM, Istanbul, pp 91\u2013910"},{"key":"1890_CR22","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1007\/s10586-018-2861-0","volume":"22","author":"R Saxena","year":"2019","unstructured":"Saxena R, Dey S (2019) A generic approach for integrity verification of big data. Cluster Comput 22:529\u2013540. https:\/\/doi.org\/10.1007\/s10586-018-2861-0","journal-title":"Cluster Comput"},{"issue":"3","key":"1890_CR23","doi-asserted-by":"publisher","first-page":"876","DOI":"10.1109\/TSC.2018.2820713","volume":"14","author":"SK Nayak","year":"2021","unstructured":"Nayak SK, Tripathy S (2021) SEPDP: Secure and efficient privacy preserving provable data possession in cloud storage. IEEE Trans Serv Comput 14(3):876\u2013888. https:\/\/doi.org\/10.1109\/TSC.2018.2820713","journal-title":"IEEE Trans Serv Comput"},{"issue":"06","key":"1890_CR24","doi-asserted-by":"publisher","first-page":"2090","DOI":"10.1109\/TSC.2019.2912379","volume":"14","author":"J Yu","year":"2021","unstructured":"Yu J, Hao R (2021) Comments on \u201cSEPDP: secure and efficient privacy preserving provable data possession in cloud storage.\u201d IEEE Trans Serv Comput 14(06):2090\u20132092. https:\/\/doi.org\/10.1109\/TSC.2019.2912379","journal-title":"IEEE Trans Serv Comput"},{"key":"1890_CR25","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-023-17170-3","author":"R Bingu","year":"2023","unstructured":"Bingu R, Jothilakshmi S (2023) Cloud auditing and authentication scheme for establishing privacy preservation. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-023-17170-3","journal-title":"Multimed Tools Appl"},{"key":"1890_CR26","doi-asserted-by":"publisher","unstructured":"Shen J, Guo F, Chen X, Susilo W (2020) Secure cloud auditing with efficient ownership transfer. In: Chen L, Li N, Liang K, Schneider S (eds) Computer Security \u2013 ESORICS 2020. ESORICS 2020. Lecture Notes in Computer Science(), vol 12308. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-030-58951-6_30","DOI":"10.1007\/978-3-030-58951-6_30"},{"issue":"12","key":"1890_CR27","doi-asserted-by":"publisher","first-page":"16592","DOI":"10.1109\/TVT.2023.3295953","volume":"72","author":"Z Zhou","year":"2023","unstructured":"Zhou Z et al (2023) A practical data audit scheme with retrievability and indistinguishable privacy-preserving for vehicular cloud computing. IEEE Trans Veh Technol 72(12):16592\u201316606. https:\/\/doi.org\/10.1109\/TVT.2023.3295953","journal-title":"IEEE Trans Veh Technol"},{"key":"1890_CR28","doi-asserted-by":"publisher","unstructured":"Zhao M, Ding Y, Zhang T, Zhou X (2022) Secure outsourced VANET data in clouds with designated supervisor. 2022 7th IEEE International Conference on Data Science in Cyberspace (DSC), Guilin, China, pp. 627\u2013632. https:\/\/doi.org\/10.1109\/DSC55868.2022.00095","DOI":"10.1109\/DSC55868.2022.00095"},{"issue":"22","key":"1890_CR29","doi-asserted-by":"publisher","first-page":"20065","DOI":"10.1109\/JIOT.2023.3282939","volume":"10","author":"C Gai","year":"2023","unstructured":"Gai C, Shen W, Yang M, Yu J (2023) PPADT: privacy-preserving identity-based public auditing with efficient data transfer for cloud-based IoT Data. IEEE Internet Things J 10(22):20065\u201320079. https:\/\/doi.org\/10.1109\/JIOT.2023.3282939","journal-title":"IEEE Internet Things J"},{"issue":"7","key":"1890_CR30","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1145\/362686.362692","volume":"13","author":"BH Bloom","year":"1970","unstructured":"Bloom BH (1970) Space\/time trade-offs in hash coding with allowable errors. Commun ACM 13(7):422\u2013426. https:\/\/doi.org\/10.1145\/362686.362692","journal-title":"Commun ACM"},{"key":"1890_CR31","doi-asserted-by":"publisher","unstructured":"Goodrich MT, Mitzenmacher M (2011) Invertible bloom lookup tables. In Proc. IEEE 49th Annual Allerton Conference on Communications, Control, Computation pp. 792\u2013799. https:\/\/doi.org\/10.1109\/Allerton.2011.6120248","DOI":"10.1109\/Allerton.2011.6120248"},{"key":"1890_CR32","doi-asserted-by":"publisher","unstructured":"Shamir A (1984) Identity-Based Cryptosystems and Signature Schemes Archived 2020-08-12 at the Wayback Machine. Advances in Cryptology \u2013 Proceedings of CRYPTO 84, Lecture Notes in Computer Science, 7:47-53. https:\/\/doi.org\/10.1007\/3-540-39568-7_5","DOI":"10.1007\/3-540-39568-7_5"},{"key":"1890_CR33","doi-asserted-by":"publisher","unstructured":"Boneh D, Franklin M (2001) Identity-based encryption from the Weil pairing. Advances in Cryptology \u2013 CRYPTO 2001. Lecture Notes in Computer Science. Vol. 2139\/2001. Springer. pp. 213\u2013229. https:\/\/doi.org\/10.1007\/3-540-44647-8_13","DOI":"10.1007\/3-540-44647-8_13"},{"key":"1890_CR34","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/j.future.2016.02.003","volume":"62","author":"Y Yu","year":"2016","unstructured":"Yu Y, Xue L, Au MH, Susilo W, Ni J, Zhang Y, Vasilakos AV, Shen J (2016) Cloud data integrity checking with an identity-based auditing mechanism from RSA. Future Gener Comput Syst 62:85\u201391. https:\/\/doi.org\/10.1016\/j.future.2016.02.003","journal-title":"Future Gener Comput Syst"},{"issue":"2","key":"1890_CR35","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1109\/TIFS.2018.2850312","volume":"14","author":"W Shen","year":"2019","unstructured":"Shen W, Qin J, Yu J, Hao R, Hu J (2019) Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage. IEEE Trans Inf Forensics Secur 14(2):331\u2013346. https:\/\/doi.org\/10.1109\/TIFS.2018.2850312","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"1890_CR36","doi-asserted-by":"publisher","first-page":"45822","DOI":"10.1109\/ACCESS.2021.3066497","volume":"9","author":"H Yan","year":"2021","unstructured":"Yan H, Gui W (2021) Efficient identity-based public integrity auditing of shared data in cloud storage with user privacy preserving. IEEE Access 9:45822\u201345831. https:\/\/doi.org\/10.1109\/ACCESS.2021.3066497","journal-title":"IEEE Access"},{"key":"1890_CR37","doi-asserted-by":"publisher","unstructured":"Liu Z, Ren L, Li R, Liu Q, Zhao Y (2022) Id-based sanitizable signature data integrity auditing scheme with privacy-preserving. Comput Secur 121. https:\/\/doi.org\/10.1016\/j.cose.2022.102858","DOI":"10.1016\/j.cose.2022.102858"},{"issue":"4","key":"1890_CR38","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1109\/TIFS.2016.2615853","volume":"12","author":"Y Yu","year":"2017","unstructured":"Yu Y et al (2017) Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Trans Inf Forensics Secur 12(4):767\u2013778. https:\/\/doi.org\/10.1109\/TIFS.2016.2615853","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"2","key":"1890_CR39","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1109\/TSC.2011.51","volume":"6","author":"Y Zhu","year":"2013","unstructured":"Zhu Y, Ahn G-J, Hu H, Yau SS, An HG, Hu C-J (2013) Dynamic audit services for outsourced storages in clouds. IEEE Trans Serv Comput 6(2):227\u2013238. https:\/\/doi.org\/10.1109\/TSC.2011.51","journal-title":"IEEE Trans Serv Comput"},{"key":"1890_CR40","doi-asserted-by":"publisher","first-page":"4572","DOI":"10.1109\/TIFS.2024.3383772","volume":"19","author":"L Wang","year":"2024","unstructured":"Wang L, Hu M, Jia Z, Guan Z, Chen Z (2024) SStore: an efficient and secure provable data auditing platform for cloud. IEEE Trans Inf Forensics Secur 19:4572\u20134584. https:\/\/doi.org\/10.1109\/TIFS.2024.3383772","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"1890_CR41","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1186\/s13677-024-00605-z","volume":"13","author":"P Goswami","year":"2024","unstructured":"Goswami P, Faujdar N, Debnath S et al (2024) Investigation on storage level data integrity strategies in cloud computing: classification, security obstructions, challenges and vulnerability. J Cloud Comp 13:45. https:\/\/doi.org\/10.1186\/s13677-024-00605-z","journal-title":"J Cloud Comp"},{"key":"1890_CR42","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2024.3375369","author":"W Li","year":"2024","unstructured":"Li W, Susilo W, Xia C, Huang L, Guo F, Wang T (2024) Secure data integrity check based on verified public key encryption with equality test for multi-cloud storage. IEEE Trans Dependable Secure Comput. https:\/\/doi.org\/10.1109\/TDSC.2024.3375369","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"1890_CR43","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.future.2023.08.016","volume":"150","author":"Y Sellami","year":"2024","unstructured":"Sellami Y, Imine Y, Gallais A (2024) A verifiable data integrity scheme for distributed data sharing in fog computing architecture. Futur Gener Comput Syst 150:64\u201377. https:\/\/doi.org\/10.1016\/j.future.2023.08.016","journal-title":"Futur Gener Comput Syst"},{"key":"1890_CR44","doi-asserted-by":"publisher","first-page":"3089","DOI":"10.1007\/s11227-023-05576-7","volume":"80","author":"KU Maheswari","year":"2024","unstructured":"Maheswari KU, Bhanu SMS, Savarimuthu N (2024) Clustering-based data integrity verification approach for multi-replica in a fog environment. J Supercomput 80:3089\u20133113. https:\/\/doi.org\/10.1007\/s11227-023-05576-7","journal-title":"J Supercomput"},{"key":"1890_CR45","doi-asserted-by":"publisher","DOI":"10.1007\/s13198-022-01689-z","author":"Nayudu","year":"2022","unstructured":"Nayudu, Sekhar (2022) Accountable specific attribute-based encryption scheme for\u00a0cloud access control. Int J Syst Assur Eng Manag. https:\/\/doi.org\/10.1007\/s13198-022-01689-z","journal-title":"Int J Syst Assur Eng Manag"},{"key":"1890_CR46","first-page":"53","volume":"40","author":"Nayudu","year":"2021","unstructured":"Nayudu, Sekhar (2021) Enhancement of attribute-based encryption schemes through machine learning techniques: research challenges and opportunities. Jilin Daxue Xuebao (Gongxueban)\/J Jilin Univ 40:53\u201370","journal-title":"Jilin Daxue Xuebao (Gongxueban)\/J Jilin Univ"},{"issue":"3","key":"1890_CR47","doi-asserted-by":"publisher","first-page":"3801","DOI":"10.32604\/iasc.2023.032267","volume":"35","author":"Nayudu","year":"2023","unstructured":"Nayudu, Sekhar (2023) Dynamic time and location information in ciphertext-policy attribute-based encryption with multi-authorization. Intell Autom Soft Comput 35(3):3801\u20133813","journal-title":"Intell Autom Soft Comput"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01890-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-024-01890-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01890-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,17]],"date-time":"2025-05-17T09:34:44Z","timestamp":1747474484000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-024-01890-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,13]]},"references-count":47,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,3]]}},"alternative-id":["1890"],"URL":"https:\/\/doi.org\/10.1007\/s12083-024-01890-w","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1,13]]},"assertion":[{"value":"28 October 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 December 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 January 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"68"}}