{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T04:08:51Z","timestamp":1768968531550,"version":"3.49.0"},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T00:00:00Z","timestamp":1744848000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T00:00:00Z","timestamp":1744848000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,5]]},"DOI":"10.1007\/s12083-025-01969-y","type":"journal-article","created":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T02:48:46Z","timestamp":1744858126000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["LCMAS-IoMT: Lightweight certificate-less mutualauthentication scheme for internet of medical things"],"prefix":"10.1007","volume":"18","author":[{"given":"D. Hemila","family":"Rexline","sequence":"first","affiliation":[]},{"given":"X.","family":"Anita","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,17]]},"reference":[{"key":"1969_CR1","unstructured":"IoT Analytics (2023) State of IoT, Spring 2023. Retrieved from https:\/\/iot-analytics.com\/product\/state-of-iot-spring-2023\/"},{"issue":"1","key":"1969_CR2","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1007\/s11276-023-03473-8","volume":"30","author":"Y Rajkumar","year":"2024","unstructured":"Rajkumar Y, Kumar SS (2024) An elliptic curve cryptography based certificate-less signature aggregation scheme for efficient authentication in vehicular ad hoc networks. Wireless Netw 30(1):335\u2013362","journal-title":"Wireless Netw"},{"key":"1969_CR3","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/s12652-017-0598-x","volume":"10","author":"LP Malasinghe","year":"2019","unstructured":"Malasinghe LP, Ramzan N, Dahal K (2019) Remote patient monitoring: a comprehensive study. J Ambient Intell Humaniz Comput 10:57\u201376","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"1969_CR4","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/978-3-030-66633-0_8","volume-title":"Efficient data handling for massive internet of Medical things: Healthcare Data Analytics","author":"JB Awotunde","year":"2021","unstructured":"Awotunde JB, Ogundokun RO, Misra S (2021) Cloud and IoMT-based big data analytics system during COVID-19 pandemic. Efficient data handling for massive internet of Medical things: Healthcare Data Analytics. Springer International Publishing, Cham, pp 181\u2013201"},{"key":"1969_CR5","doi-asserted-by":"crossref","unstructured":"Shah V, Khang A (2023) Internet of Medical Things (IoMT) driving the digital transformation of the healthcare sector. In Data-centric AI solutions and emerging technologies in the healthcare ecosystem. CRC Press, pp 15\u201326","DOI":"10.1201\/9781003356189-2"},{"key":"1969_CR6","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1016\/j.comcom.2020.05.029","volume":"160","author":"PP Ray","year":"2020","unstructured":"Ray PP, Dash D, Kumar N (2020) Sensors for internet of medical things: State-of-the-art, security and privacy issues, challenges and future directions. Comput Commun 160:111\u2013131","journal-title":"Comput Commun"},{"key":"1969_CR7","doi-asserted-by":"crossref","unstructured":"Adeniyi EA, Ogundokun RO, Awotunde JB (2021) IoMT-based wearable body sensors network healthcare monitoring system. IoT in healthcare and ambient assisted living, pp 103\u2013121","DOI":"10.1007\/978-981-15-9897-5_6"},{"issue":"2","key":"1969_CR8","doi-asserted-by":"publisher","first-page":"1576","DOI":"10.1109\/JIOT.2018.2848284","volume":"6","author":"MA Jan","year":"2018","unstructured":"Jan MA, Usman M, He X, Rehman AU (2018) SAMS: A seamless and authorized multimedia streaming framework for WMSN-based IoMT. IEEE Internet Things J 6(2):1576\u20131583","journal-title":"IEEE Internet Things J"},{"key":"1969_CR9","doi-asserted-by":"crossref","unstructured":"Bhabani B, Mahapatro J (2021) A delay-efficient channel allocation scheme for disseminating alert messages using WBAN and VANET. In ICC 2021-IEEE International Conference on Communications. IEEE, pp 1\u20136","DOI":"10.1109\/ICC42927.2021.9500345"},{"issue":"15","key":"1969_CR10","doi-asserted-by":"publisher","first-page":"17403","DOI":"10.1007\/s11227-022-04568-3","volume":"78","author":"A Binbusayyis","year":"2022","unstructured":"Binbusayyis A, Alaskar H, Vaiyapuri T, Dinesh MJTJOS (2022) An investigation and comparison of machine learning approaches for intrusion detection in IoMT network. J Supercomput 78(15):17403\u201317422","journal-title":"J Supercomput"},{"key":"1969_CR11","doi-asserted-by":"crossref","unstructured":"Baranchuk A, Refaat MM, Patton KK, Chung MK, Krishnan K, Kutyifa V, \u2026 American College of Cardiology\u2019s Electrophysiology Section Leadership (2018) Cybersecurity for ca3rdiac implantable electronic devices: what should you know? J Am Coll Cardiol 71(11):1284\u20131288","DOI":"10.1016\/j.jacc.2018.01.023"},{"issue":"17","key":"1969_CR12","doi-asserted-by":"publisher","first-page":"2777","DOI":"10.3390\/electronics11172777","volume":"11","author":"S Hamid","year":"2022","unstructured":"Hamid S, Bawany NZ, Sodhro AH, Lakhan A, Ahmed S (2022) A systematic review and IoMT based big data framework for COVID-19 prevention and detection. Electronics 11(17):2777","journal-title":"Electronics"},{"issue":"3","key":"1969_CR13","doi-asserted-by":"publisher","first-page":"1442","DOI":"10.1007\/s12083-024-01636-8","volume":"17","author":"Y Rajkumar","year":"2024","unstructured":"Rajkumar Y, Kumar SS (2024) A lightweight privacy preserving distributed certificate-less aggregate based mutual authentication scheme for vehicular adhoc networks. Peer-to-Peer Netw Appl 17(3):1442\u20131466","journal-title":"Peer-to-Peer Netw Appl"},{"key":"1969_CR14","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/j.future.2022.08.004","volume":"138","author":"A Rahman","year":"2023","unstructured":"Rahman A, Hasan K, Kundu D, Islam MJ, Debnath T, Band SS, Kumar N (2023) On the ICN-IoT with federated learning integration of communication: Concepts, security-privacy issues, applications, and future perspectives. Futur Gener Comput Syst 138:61\u201388","journal-title":"Futur Gener Comput Syst"},{"key":"1969_CR15","doi-asserted-by":"crossref","unstructured":"Chen Q, Sowan AK, Xu S (2018) A safety and security architecture for reducing accidents in intelligent transportation systems. In 2018 IEEE\/ACM International Conference on Computer-Aided Design (ICCAD). IEEE, pp 1\u20137","DOI":"10.1145\/3240765.3243462"},{"issue":"4","key":"1969_CR16","doi-asserted-by":"publisher","first-page":"775","DOI":"10.1080\/02564602.2021.1927863","volume":"39","author":"S Razdan","year":"2022","unstructured":"Razdan S, Sharma S (2022) Internet of medical things (IoMT): Overview, emerging technologies, and case studies. IETE Tech Rev 39(4):775\u2013788","journal-title":"IETE Tech Rev"},{"key":"1969_CR17","doi-asserted-by":"crossref","unstructured":"Al-Zubaidie MH, Razzaq RH (2024) Maintaining security of patient data by employing private blockchain and fog computing technologies based on internet of medical things. Informatica 48(12)","DOI":"10.31449\/inf.v48i12.6047"},{"key":"1969_CR18","doi-asserted-by":"crossref","unstructured":"Raya M, Hubaux JP (2005) The security of vehicular ad hoc networks. In Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks, pp 11\u201321","DOI":"10.1145\/1102219.1102223"},{"issue":"7","key":"1969_CR19","doi-asserted-by":"publisher","first-page":"3589","DOI":"10.1109\/TVT.2010.2051468","volume":"59","author":"Y Sun","year":"2010","unstructured":"Sun Y, Lu R, Lin X, Shen X, Su J (2010) An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications. IEEE Trans Veh Technol 59(7):3589\u20133603","journal-title":"IEEE Trans Veh Technol"},{"key":"1969_CR20","doi-asserted-by":"crossref","unstructured":"Lu R, Lin X, Zhu H, Ho PH, Shen X (2008) ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications. In IEEE INFOCOM 2008-The 27th Conference on Computer Communications. IEEE, pp 1229\u20131237","DOI":"10.1109\/INFOCOM.2008.179"},{"key":"1969_CR21","doi-asserted-by":"crossref","unstructured":"Zhang C, Lin X, Lu R, Ho PH (2008) RAISE: An efficient RSU-aided message authentication scheme in vehicular communication networks. In 2008 IEEE international conference on communications, pp 1451\u20131457. IEEE","DOI":"10.1109\/ICC.2008.281"},{"issue":"1","key":"1969_CR22","doi-asserted-by":"publisher","first-page":"39","DOI":"10.3233\/JCS-2007-15103","volume":"15","author":"M Raya","year":"2007","unstructured":"Raya M, Hubaux JP (2007) Securing vehicular ad hoc networks. J Comput Secur 15(1):39\u201368","journal-title":"J Comput Secur"},{"issue":"3","key":"1969_CR23","doi-asserted-by":"publisher","first-page":"1693","DOI":"10.32604\/iasc.2022.024714","volume":"34","author":"AJ Basha","year":"2022","unstructured":"Basha AJ, Rajkumar N, AlZain MA, Masud M, Abouhawwash M (2022) Fog-based Self-Sovereign Identity with RSA in Securing IoMT Data. Intell Autom Soft Comput 34(3):1693\u20131706","journal-title":"Intell Autom Soft Comput"},{"key":"1969_CR24","doi-asserted-by":"crossref","unstructured":"Aggarwal M, Zubair M, Unal D, Al-Ali A, Reimann T, Alinier G (2021) A testbed implementation of a biometric identity-based encryption for IoMT-enabled healthcare system. In Proceedings of the 5th International Conference on Future Networks and Distributed Systems, pp 58\u201363","DOI":"10.1145\/3508072.3508082"},{"issue":"10","key":"1969_CR25","doi-asserted-by":"publisher","first-page":"9136","DOI":"10.1109\/JIOT.2022.3233180","volume":"10","author":"X Chen","year":"2022","unstructured":"Chen X, He D, Khan MK, Luo M, Peng C (2022) A secure certificatelesssigncryption scheme without pairing for internet of medical things. IEEE Internet Things J 10(10):9136\u20139147","journal-title":"IEEE Internet Things J"},{"key":"1969_CR26","doi-asserted-by":"publisher","first-page":"102296","DOI":"10.1016\/j.sysarc.2021.102296","volume":"120","author":"AK Maurya","year":"2021","unstructured":"Maurya AK, Das AK, Jamal SS, Giri D (2021) Secure user authentication mechanism for IoT-enabled Wireless Sensor Networks based on multiple Bloom filters. J Syst Architect 120:102296","journal-title":"J Syst Architect"},{"issue":"1","key":"1969_CR27","first-page":"4472945","volume":"2022","author":"X Yang","year":"2022","unstructured":"Yang X, Chen A, Wang Z, Du X, Wang C (2022) Cryptanalysis of an efficient and secure certificateless aggregate signature-based authentication scheme for vehicular Ad Hoc networks. Secur Commun Netw 2022(1):4472945","journal-title":"Secur Commun Netw"},{"issue":"5","key":"1969_CR28","doi-asserted-by":"publisher","first-page":"2682","DOI":"10.3390\/s23052682","volume":"23","author":"SK SripathiVenkata Naga","year":"2023","unstructured":"SripathiVenkata Naga SK, Yesuraj R, Munuswamy S, Arputharaj K (2023) A comprehensive survey on certificate-less authentication schemes for vehicular ad hoc networks in intelligent transportation systems. Sensors 23(5):2682","journal-title":"Sensors"},{"issue":"6","key":"1969_CR29","doi-asserted-by":"publisher","first-page":"7559","DOI":"10.1007\/s12652-023-04557-1","volume":"14","author":"M Ghahramani","year":"2023","unstructured":"Ghahramani M, HaddadPajouh H, Javidan R, Kumari S (2023) VQR: Vulnerability analysis in quadratic residues-based authentication protocols. J Ambient Intell Humaniz Comput 14(6):7559\u20137574","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"1969_CR30","doi-asserted-by":"publisher","first-page":"2005","DOI":"10.1109\/TIFS.2023.3262125","volume":"18","author":"M Ghahramani","year":"2023","unstructured":"Ghahramani M (2023) Find it with a pencil: an efficient approach for vulnerability detection in authentication protocols. IEEE Trans Inf Forensics Secur 18:2005\u20132014","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"12","key":"1969_CR31","doi-asserted-by":"publisher","first-page":"16110","DOI":"10.1109\/TVT.2020.3042431","volume":"69","author":"W Hathal","year":"2020","unstructured":"Hathal W, Cruickshank H, Sun Z, Maple C (2020) Certificateless and lightweight authentication scheme for vehicular communication networks. IEEE Trans Veh Technol 69(12):16110\u201316125","journal-title":"IEEE Trans Veh Technol"},{"issue":"5","key":"1969_CR32","doi-asserted-by":"publisher","first-page":"2314","DOI":"10.1109\/JBHI.2022.3143207","volume":"27","author":"SA Soleymani","year":"2022","unstructured":"Soleymani SA, Goudarzi S, Anisi MH, Jindal A, Kama N, Ismail SA (2022) A privacy-preserving authentication scheme for real-time medical monitoring systems. IEEE J Biomed Health Inform 27(5):2314\u20132322","journal-title":"IEEE J Biomed Health Inform"},{"issue":"1","key":"1969_CR33","doi-asserted-by":"publisher","first-page":"679","DOI":"10.1007\/s10207-023-00762-3","volume":"23","author":"MR Patruni","year":"2024","unstructured":"Patruni MR, Humayun AG (2024) PPAM-mIoMT: a privacy-preserving authentication with device verification for securing healthcare systems in 5G networks. Int J Inf Secur 23(1):679\u2013698","journal-title":"Int J Inf Secur"},{"issue":"4","key":"1969_CR34","doi-asserted-by":"publisher","first-page":"2403","DOI":"10.1007\/s11277-023-10239-0","volume":"129","author":"C Hsu","year":"2023","unstructured":"Hsu C, Harn L, Xia Z, Zhao Z, Xu H (2023) Fast and lightweight authenticated group key agreement realizing privacy protection for resource-constrained IoMT. Wireless Pers Commun 129(4):2403\u20132417","journal-title":"Wireless Pers Commun"},{"issue":"9","key":"1969_CR35","doi-asserted-by":"publisher","first-page":"9197","DOI":"10.1007\/s13369-021-05707-3","volume":"46","author":"B Narwal","year":"2021","unstructured":"Narwal B, Mohapatra AK (2021) SAMAKA: secure and anonymous mutual authentication and key agreement scheme for wireless body area networks. Arab J Sci Eng 46(9):9197\u20139219","journal-title":"Arab J Sci Eng"},{"key":"1969_CR36","doi-asserted-by":"publisher","first-page":"12047","DOI":"10.1109\/ACCESS.2019.2891105","volume":"7","author":"CM Chen","year":"2019","unstructured":"Chen CM, Xiang B, Liu Y, Wang KH (2019) A secure authentication protocol for internet of vehicles. Ieee Access 7:12047\u201312057","journal-title":"Ieee Access"},{"key":"1969_CR37","doi-asserted-by":"publisher","first-page":"991","DOI":"10.1007\/s11277-019-06897-8","volume":"111","author":"SS Sahoo","year":"2020","unstructured":"Sahoo SS, Mohanty S, Majhi B (2020) Improved biometric-based mutual authentication and key agreement scheme using ECC. Wireless Pers Commun 111:991\u20131017","journal-title":"Wireless Pers Commun"},{"key":"1969_CR38","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.jpdc.2020.11.003","volume":"149","author":"Z Xu","year":"2021","unstructured":"Xu Z, Liang W, Li KC, Xu J, Jin H (2021) A blockchain-based roadside unit-assisted authentication and key agreement protocol for internet of vehicles. J Parallel Distrib Comput 149:29\u201339","journal-title":"J Parallel Distrib Comput"},{"issue":"7","key":"1969_CR39","doi-asserted-by":"publisher","first-page":"5810","DOI":"10.1109\/JIOT.2022.3152900","volume":"10","author":"Y Liu","year":"2022","unstructured":"Liu Y, Ni L, Peng M (2022) A secure and efficient authentication protocol for satellite-terrestrial networks. IEEE Internet Things J 10(7):5810\u20135822","journal-title":"IEEE Internet Things J"},{"issue":"21","key":"1969_CR40","doi-asserted-by":"publisher","first-page":"21136","DOI":"10.1109\/JIOT.2022.3175756","volume":"9","author":"C Pu","year":"2022","unstructured":"Pu C, Zerkle H, Wall A, Lim S, Choo KKR, Ahmed I (2022) A lightweight and anonymous authentication and key agreement protocol for wireless body area networks. IEEE Internet Things J 9(21):21136\u201321146","journal-title":"IEEE Internet Things J"},{"key":"1969_CR41","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1016\/j.comnet.2018.05.006","volume":"140","author":"AM Koya","year":"2018","unstructured":"Koya AM, Deepthi PP (2018) Anonymous hybrid mutual authentication and key agreement scheme for wireless body area network. Comput Netw 140:138\u2013151","journal-title":"Comput Netw"},{"issue":"11","key":"1969_CR42","doi-asserted-by":"publisher","first-page":"9716","DOI":"10.1109\/JIOT.2023.3234178","volume":"10","author":"Y Zhang","year":"2023","unstructured":"Zhang Y, He D, Vijayakumar P, Luo M, Huang X (2023) SAPFS: An efficient symmetric-key authentication key agreement scheme with perfect forward secrecy for industrial Internet of Things. IEEE Internet Things J 10(11):9716\u20139726","journal-title":"IEEE Internet Things J"},{"issue":"10","key":"1969_CR43","doi-asserted-by":"publisher","first-page":"10650","DOI":"10.1109\/JIOT.2020.3006523","volume":"7","author":"M Kumar","year":"2020","unstructured":"Kumar M, Chand S (2020) A secure and efficient cloud-centric internet-of-medical-things-enabled smart healthcare system with public verifiability. IEEE Internet Things J 7(10):10650\u201310659","journal-title":"IEEE Internet Things J"},{"issue":"22","key":"1969_CR44","doi-asserted-by":"publisher","first-page":"15312","DOI":"10.3390\/su142215312","volume":"14","author":"S Alam","year":"2022","unstructured":"Alam S, Shuaib M, Ahmad S, Jayakody DNK, Muthanna A, Bharany S, Elgendy IA (2022) Blockchain-based solutions supporting reliable healthcare for fog computing and Internet of medical things (IoMT) integration. Sustainability 14(22):15312","journal-title":"Sustainability"},{"issue":"12","key":"1969_CR45","doi-asserted-by":"publisher","first-page":"2965","DOI":"10.1109\/TCAD.2018.2801227","volume":"37","author":"F Firouzi","year":"2018","unstructured":"Firouzi F, Farahani B, Ibrahim M, Chakrabarty K (2018) Keynote paper: from EDA to IoT eHealth: promises, challenges, and solutions. IEEE Trans Comput Aided Des Integr Circuits Syst 37(12):2965\u20132978","journal-title":"IEEE Trans Comput Aided Des Integr Circuits Syst"},{"issue":"11","key":"1969_CR46","doi-asserted-by":"publisher","first-page":"8485","DOI":"10.1109\/JIOT.2021.3116039","volume":"9","author":"H Zhong","year":"2021","unstructured":"Zhong H, Chen L, Cui J, Zhang J, Bolodurina I, Liu L (2021) Secure and lightweight conditional privacy-preserving authentication for fog-based vehicular ad hoc networks. IEEE Internet Things J 9(11):8485\u20138497","journal-title":"IEEE Internet Things J"},{"key":"1969_CR47","doi-asserted-by":"crossref","unstructured":"Yassein MB, Hmeidi I, Al-Harbi M, Mrayan L, Mardini W, Khamayseh Y (2019) IoT-based healthcare systems: A survey. In Proceedings of the second international conference on data science, E-learning and information systems, pp 1\u20139","DOI":"10.1145\/3368691.3368721"},{"issue":"1","key":"1969_CR48","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/s42452-019-1925-y","volume":"2","author":"S Selvaraj","year":"2020","unstructured":"Selvaraj S, Sundaravaradhan S (2020) Challenges and opportunities in IoT healthcare systems: a systematic review. SN Appl Sci 2(1):139","journal-title":"SN Appl Sci"},{"issue":"2","key":"1969_CR49","first-page":"323","volume":"20","author":"C Guo","year":"2018","unstructured":"Guo C, Chang CC, Chang SC (2018) A secure and efficient mutual authentication and key agreement protocol with smart cards for wireless communications. Int J Netw Secur 20(2):323\u2013331","journal-title":"Int J Netw Secur"},{"issue":"3","key":"1969_CR50","doi-asserted-by":"publisher","first-page":"2347","DOI":"10.1007\/s11277-021-08826-0","volume":"121","author":"M Ghahramani","year":"2021","unstructured":"Ghahramani M, Javidan R (2021) A robust anonymous remote user authentication protocol for IoT services. Wireless Pers Commun 121(3):2347\u20132369","journal-title":"Wireless Pers Commun"},{"issue":"2","key":"1969_CR51","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/s11416-022-00448-9","volume":"19","author":"M Ghahramani","year":"2023","unstructured":"Ghahramani M, Javidan R (2023) Time dependency: An efficient biometric-based authentication for secure communication in wireless healthcare sensor networks. J Comput Virol Hack Tech 19(2):303\u2013317","journal-title":"J Comput Virol Hack Tech"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-01969-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-01969-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-01969-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,10]],"date-time":"2025-05-10T02:32:37Z","timestamp":1746844357000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-01969-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,17]]},"references-count":51,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,5]]}},"alternative-id":["1969"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-01969-y","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4,17]]},"assertion":[{"value":"18 June 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 March 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 April 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"All authors certify that no humans or animals are involved in conduct of this study.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"All authors gave consent to publish.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to publish"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"150"}}