{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T20:30:43Z","timestamp":1768422643809,"version":"3.49.0"},"reference-count":53,"publisher":"Springer Science and Business Media LLC","issue":"7-8","license":[{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100004735","name":"Natural Science Foundation of Hunan Province","doi-asserted-by":"publisher","award":["2018JJ3191"],"award-info":[{"award-number":["2018JJ3191"]}],"id":[{"id":"10.13039\/501100004735","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ann. Telecommun."],"published-print":{"date-parts":[[2020,8]]},"DOI":"10.1007\/s12243-020-00765-4","type":"journal-article","created":{"date-parts":[[2020,6,2]],"date-time":"2020-06-02T18:04:47Z","timestamp":1591121087000},"page":"307-317","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["An anonymous and identity-trackable data transmission scheme for smart grid under smart city notion"],"prefix":"10.1007","volume":"75","author":[{"given":"Fan","family":"Wu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6619-554X","authenticated-orcid":false,"given":"Xiong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Lili","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Saru","family":"Kumari","sequence":"additional","affiliation":[]},{"given":"Dingbao","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Joel J. P. C.","family":"Rodrigues","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,6,1]]},"reference":[{"issue":"3","key":"765_CR1","doi-asserted-by":"publisher","first-page":"4844","DOI":"10.1109\/JIOT.2018.2872133","volume":"6","author":"W Li","year":"2019","unstructured":"Li W, Chen Z, Gao X, Liu W, Wang J (2019) Multi-model framework for indoor localization under mobile edge computing environment. IEEE Internet Things J 6(3):4844\u20134853. https:\/\/doi.org\/10.1109\/JIOT.2018.2872133","journal-title":"IEEE Internet Things J"},{"key":"765_CR2","doi-asserted-by":"publisher","unstructured":"Wang J, Gao Y, Yin X, Li F, Kim HJ (2018) An enhanced PEGASIS algorithm with mobile sink support for wireless sensor networks. Wirel Commun Mob Comput, 1\u20139. https:\/\/doi.org\/10.1155\/2018\/9472075","DOI":"10.1155\/2018\/9472075"},{"issue":"3","key":"765_CR3","first-page":"433","volume":"56","author":"J Wang","year":"2018","unstructured":"Wang J, Ju C, Gao Y, Sangaiah AK, Gj Kim (2018) A PSO based energy efficient coverage control algorithm for wireless sensor networks. Comput Mater Continua 56(3):433\u2013446","journal-title":"Comput Mater Continua"},{"issue":"3","key":"765_CR4","doi-asserted-by":"crossref","first-page":"711","DOI":"10.32604\/cmc.2019.05450","volume":"58","author":"J Wang","year":"2019","unstructured":"Wang J, Gao Y, Liu W, Wu W, Lim SJ (2019) An asynchronous clustering and mobile data gathering schema based on timer mechanism in wireless sensor networks. Comput Mater Continua 58(3):711\u2013725","journal-title":"Comput Mater Continua"},{"key":"765_CR5","doi-asserted-by":"publisher","unstructured":"Wang J, Gao Y, Liu W, Sangaiah AK, Kim HJ (2019) An intelligent data gathering schema with data fusion supported for mobile sink in wireless sensor networks. International Journal of Distributed Sensor Networks. https:\/\/doi.org\/10.1177\/1550147719839581","DOI":"10.1177\/1550147719839581"},{"key":"765_CR6","doi-asserted-by":"crossref","unstructured":"Liang W, Fan Y, Li KC, Zhang D, Gaudiot JL (2020) Secure data storage and recovery in industrial blockchain network environments. IEEE Transactions on Industrial Informatics","DOI":"10.1109\/TII.2020.2966069"},{"issue":"3","key":"765_CR7","doi-asserted-by":"crossref","first-page":"2063","DOI":"10.1109\/TII.2019.2946791","volume":"16","author":"W Liang","year":"2020","unstructured":"Liang W, Li KC, Long J, Kui X, Zomaya AY (2020) An industrial network intrusion detection algorithm based on multi-feature data clustering optimization model. IEEE Trans Industr Inform 16(3):2063\u20132071","journal-title":"IEEE Trans Industr Inform"},{"issue":"3","key":"765_CR8","doi-asserted-by":"publisher","first-page":"2507","DOI":"10.1109\/JSYST.2019.2910409","volume":"13","author":"S He","year":"2019","unstructured":"He S, Xie K, Xie K, Xu C, Jin W (2019) Interference-aware multi-source transmission in multi-radio and multi-channel wireless network. IEEE Syst J 13 (3):2507\u20132518. https:\/\/doi.org\/10.1109\/JSYST.2019.2910409","journal-title":"IEEE Syst J"},{"issue":"18","key":"765_CR9","doi-asserted-by":"publisher","first-page":"3978","DOI":"10.3390\/s19183978","volume":"19","author":"S He","year":"2019","unstructured":"He S, Tang Y, Li Z, Li F, Xie K, Kim HJ, Kim GJ (2019) Interference-aware routing for difficult wireless sensor network environment with SWIPT. Sensors 19(18):3978. https:\/\/doi.org\/10.3390\/s19183978","journal-title":"Sensors"},{"key":"765_CR10","doi-asserted-by":"publisher","unstructured":"Zhang J, Wang W, Lu C, Wang J, Sangaiah AK (2019) Lightweight deep network for traffic sign classification. Ann Telecommun, 1\u201311. https:\/\/doi.org\/10.1007\/s12243-019-00731-9","DOI":"10.1007\/s12243-019-00731-9"},{"issue":"5","key":"765_CR11","doi-asserted-by":"crossref","first-page":"3345","DOI":"10.3934\/mbe.2019167","volume":"16","author":"M Zhang","year":"2019","unstructured":"Zhang M, Lu Q, Li D, Kim J, Wang J (2019) A full convolutional network based on densenet for remote sensing scene classification. Math Biosci Eng: MBE 16(5):3345\u20133367","journal-title":"Math Biosci Eng: MBE"},{"key":"765_CR12","doi-asserted-by":"crossref","unstructured":"He S, Li Z, Tang Y, Liao Z, Wang J, Kim HJ (2019) Parameters compressing in deep learning. Comput Mater Continua, 1\u201316","DOI":"10.32604\/cmc.2020.06130"},{"issue":"1","key":"765_CR13","doi-asserted-by":"crossref","first-page":"43,956","DOI":"10.1109\/ACCESS.2019.2908668","volume":"7","author":"J Zhang","year":"2019","unstructured":"Zhang J, Jin X, Sum J, Wang J, Li K (2019) Dual model learning combined with multiple feature selection for accurate visual tracking. IEEE Access 7(1):43,956\u201343,969","journal-title":"IEEE Access"},{"key":"765_CR14","doi-asserted-by":"publisher","unstructured":"Zhang J, Jin X, Sun J, Wang J, Sangaih AK (2018) Spatial and semantic convolutional features for robust visual object tracking. Multimedia Tools and Applications. https:\/\/doi.org\/10.1007\/s11042-018-6562-8","DOI":"10.1007\/s11042-018-6562-8"},{"key":"765_CR15","doi-asserted-by":"crossref","unstructured":"Liang W, Huang W, Long J, Zhang K, Li KC, Zhang D (2020) Deep reinforcement learning for resource protection and real-time detection in IoT environment. IEEE Internet of Things Journal","DOI":"10.1109\/JIOT.2020.2974281"},{"issue":"12","key":"765_CR16","doi-asserted-by":"crossref","first-page":"6572","DOI":"10.1109\/TII.2019.2922697","volume":"15","author":"N Kumar","year":"2019","unstructured":"Kumar N, Aujla GS, Das AK, Conti M (2019) Eccauth: a secure authentication protocol for demand response management in a smart grid system. IEEE Trans Industr Inform 15(12):6572\u2013 6582","journal-title":"IEEE Trans Industr Inform"},{"issue":"3","key":"765_CR17","doi-asserted-by":"crossref","first-page":"1232","DOI":"10.1109\/TII.2017.2761806","volume":"14","author":"D He","year":"2018","unstructured":"He D, Kumar N, Zeadally S, Wang H (2018) Certificateless provable data possession scheme for cloud-based smart grid data management systems. IEEE Trans Industr Inform 14(3):1232\u20131241","journal-title":"IEEE Trans Industr Inform"},{"issue":"3","key":"765_CR18","doi-asserted-by":"crossref","first-page":"1304","DOI":"10.1109\/TSG.2015.2412091","volume":"7","author":"Y Gong","year":"2016","unstructured":"Gong Y, Cai Y, Guo Y, Fang Y (2016) A privacy-preserving scheme for incentive-based demand response in the smart grid. IEEE Trans Smart Grid 7(3):1304\u20131313","journal-title":"IEEE Trans Smart Grid"},{"issue":"4","key":"765_CR19","doi-asserted-by":"crossref","first-page":"3496","DOI":"10.1109\/TSG.2016.2633071","volume":"9","author":"Z Sui","year":"2016","unstructured":"Sui Z, Niedermeier M, de Meer H (2016) TAI: a threshold-based anonymous identification scheme for demand-response in smart grids. IEEE Trans Smart Grid 9(4):3496\u20133506","journal-title":"IEEE Trans Smart Grid"},{"key":"765_CR20","doi-asserted-by":"crossref","unstructured":"Ge S, Zeng P, Choo KKR (2017) An enhanced anonymous identification scheme for smart grids. In: International Conference on Applications and Techniques in Cyber Security and Intelligence. Springer, pp 329\u2013337","DOI":"10.1007\/978-3-319-67071-3_39"},{"key":"765_CR21","unstructured":"Cooper C (2017) Humanizing smart cities. https:\/\/inform.tmforum.org\/features-and-analysis\/2017\/03\/humanizing-smart-cities\/"},{"key":"765_CR22","unstructured":"Geisler K (2013) The relationship between smart grids and smart cities. IEEE Smart Grid Newsletter"},{"key":"765_CR23","doi-asserted-by":"crossref","unstructured":"Kursawe K, Danezis G, Kohlweiss M (2011) Privacy-friendly aggregation for the smart-grid. In: International Symposium on Privacy Enhancing Technologies Symposium. Springer, pp 175\u2013191","DOI":"10.1007\/978-3-642-22263-4_10"},{"issue":"5","key":"765_CR24","doi-asserted-by":"crossref","first-page":"2411","DOI":"10.1109\/TSG.2017.2720159","volume":"8","author":"D He","year":"2017","unstructured":"He D, Kumar N, Zeadally S, Vinel A, Yang LT (2017) Efficient and privacy-preserving data aggregation scheme for smart grid against internal adversaries. IEEE Trans Smart Grid 8(5):2411\u20132419","journal-title":"IEEE Trans Smart Grid"},{"key":"765_CR25","doi-asserted-by":"publisher","unstructured":"He D, Zeadally S, Wang H, Liu Q (2017) Lightweight data aggregation scheme against internal attackers in smart grid using elliptic curve cryptography. Wirel Commun Mob Comput, 2017. https:\/\/doi.org\/10.1155\/2017\/3194845","DOI":"10.1155\/2017\/3194845"},{"issue":"5","key":"765_CR26","doi-asserted-by":"crossref","first-page":"2428","DOI":"10.1109\/TII.2017.2705218","volume":"13","author":"Z Wang","year":"2017","unstructured":"Wang Z (2017) An identity-based data aggregation protocol for the smart grid. IEEE Trans Industr Inform 13(5):2428\u20132435","journal-title":"IEEE Trans Industr Inform"},{"key":"765_CR27","doi-asserted-by":"crossref","unstructured":"Ni J, Zhang K, Lin X, Shen XS (2016) EDAT: efficient data aggregation without TTP for privacy-assured smart metering. In: 2016 IEEE International Conference on Communications (ICC). IEEE, pp 1\u20136","DOI":"10.1109\/ICC.2016.7510611"},{"issue":"4","key":"765_CR28","doi-asserted-by":"crossref","first-page":"1145","DOI":"10.1002\/cpe.3570","volume":"28","author":"X Dong","year":"2016","unstructured":"Dong X, Zhou J, Cao Z (2016) Efficient privacy-preserving temporal and spacial data aggregation for smart grid communications. Concurr Comput: Practice Exper 28(4):1145\u20131160","journal-title":"Concurr Comput: Practice Exper"},{"issue":"4","key":"765_CR29","doi-asserted-by":"crossref","first-page":"671","DOI":"10.1007\/s11235-017-0315-2","volume":"66","author":"MA Ferrag","year":"2017","unstructured":"Ferrag MA (2017) EPEC: an efficient privacy-preserving energy consumption scheme for smart grid communications. Telecommun Syst 66(4):671\u2013688","journal-title":"Telecommun Syst"},{"key":"765_CR30","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1016\/j.adhoc.2017.05.011","volume":"64","author":"M Badra","year":"2017","unstructured":"Badra M, Zeadally S (2017) Lightweight and efficient privacy-preserving data aggregation approach for the smart grid. Ad Hoc Netw 64:32\u201340","journal-title":"Ad Hoc Netw"},{"issue":"2","key":"765_CR31","doi-asserted-by":"crossref","first-page":"462","DOI":"10.1109\/TII.2017.2721542","volume":"14","author":"S Li","year":"2018","unstructured":"Li S, Xue K, Yang Q, Hong P (2018) PPMA: privacy-preserving multisubset data aggregation in smart grid. IEEE Trans Industr Inform 14(2):462\u2013471","journal-title":"IEEE Trans Industr Inform"},{"issue":"3","key":"765_CR32","doi-asserted-by":"crossref","first-page":"4755","DOI":"10.1109\/JIOT.2018.2874473","volume":"6","author":"X Li","year":"2019","unstructured":"Li X, Liu S, Wu F, Kumari S, Rodrigues JJ (2019) Privacy preserving data aggregation scheme for mobile edge computing assisted IoT applications. IEEE Internet Things J 6(3):4755\u20134763","journal-title":"IEEE Internet Things J"},{"issue":"6","key":"765_CR33","doi-asserted-by":"crossref","first-page":"1369","DOI":"10.1109\/TIFS.2017.2656475","volume":"12","author":"H Shen","year":"2017","unstructured":"Shen H, Zhang M, Shen J (2017) Efficient privacy-preserving cube-data aggregation scheme for smart grids. IEEE Trans Inform Forens Secur 12(6):1369\u20131381","journal-title":"IEEE Trans Inform Forens Secur"},{"key":"765_CR34","doi-asserted-by":"publisher","unstructured":"Song J, Liu Y, Shao J, Tang C (2019) A dynamic membership data aggregation (DMDA) protocol for smart grid. IEEE Systems Journal. https:\/\/doi.org\/10.1109\/JSYST.2019.2912415","DOI":"10.1109\/JSYST.2019.2912415"},{"key":"765_CR35","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1016\/j.future.2016.04.016","volume":"63","author":"S Kumari","year":"2016","unstructured":"Kumari S, Li X, Wu F, Das AK, Arshad H, Khan MK (2016) A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps. Futur Gener Comput Syst 63:56\u201375","journal-title":"Futur Gener Comput Syst"},{"issue":"9","key":"765_CR36","doi-asserted-by":"crossref","first-page":"4081","DOI":"10.1109\/TII.2018.2834351","volume":"14","author":"D Wang","year":"2018","unstructured":"Wang D, Li W, Wang P (2018) Measuring two-factor authentication schemes for real-time data access in industrial wireless sensor networks. IEEE Trans Industr Inform 14(9):4081\u20134092","journal-title":"IEEE Trans Industr Inform"},{"issue":"8","key":"765_CR37","doi-asserted-by":"crossref","first-page":"3599","DOI":"10.1109\/TII.2017.2773666","volume":"14","author":"X Li","year":"2018","unstructured":"Li X, Niu J, Bhuiyan MZA, Wu F, Karuppiah M, Kumari S (2018) A robust ECC-based provable secure authentication protocol with privacy preserving for industrial Internet of Things. IEEE Trans Industr Inform 14(8):3599\u20133609","journal-title":"IEEE Trans Industr Inform"},{"issue":"4","key":"765_CR38","doi-asserted-by":"crossref","first-page":"675","DOI":"10.1109\/TSG.2011.2160661","volume":"2","author":"MM Fouda","year":"2011","unstructured":"Fouda MM, Fadlullah ZM, Kato N, Lu R, Shen XS (2011) A lightweight message authentication scheme for smart grid communications. IEEE Trans Smart Grid 2(4):675\u2013685","journal-title":"IEEE Trans Smart Grid"},{"key":"765_CR39","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1016\/j.compeleceng.2016.02.017","volume":"52","author":"K Mahmood","year":"2016","unstructured":"Mahmood K, Chaudhry SA, Naqvi H, Shon T, Ahmad HF (2016) A lightweight message authentication scheme for smart grid communications in power sector. Comput Electr Eng 52:114\u2013124","journal-title":"Comput Electr Eng"},{"issue":"2","key":"765_CR40","first-page":"906","volume":"7","author":"JL Tsai","year":"2016","unstructured":"Tsai JL, Lo NW (2016) Secure anonymous key distribution scheme for smart grid. IEEE Trans Smart Grid 7(2):906\u2013914","journal-title":"IEEE Trans Smart Grid"},{"issue":"3","key":"765_CR41","first-page":"1900","volume":"9","author":"V Odelu","year":"2016","unstructured":"Odelu V, Das AK, Wazid M, Conti M (2016) Provably secure authenticated key agreement scheme for smart grid. IEEE Trans Smart Grid 9(3):1900\u20131910","journal-title":"IEEE Trans Smart Grid"},{"issue":"14","key":"765_CR42","doi-asserted-by":"crossref","first-page":"1795","DOI":"10.1049\/iet-com.2016.0091","volume":"10","author":"D He","year":"2016","unstructured":"He D, Wang H, Khan MK, Wang L (2016) Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography. IET Commun 10(14):1795\u20131802","journal-title":"IET Commun"},{"issue":"3","key":"765_CR43","doi-asserted-by":"crossref","first-page":"2830","DOI":"10.1109\/JSYST.2018.2876226","volume":"13","author":"F Wu","year":"2019","unstructured":"Wu F, Xu L, Li X, Kumari S, Karuppiah M, Obaidat MS (2019) A lightweight and provably secure key agreement system for smart grid with elliptic curve cryptography. IEEE Syst J 13(3):2830\u20132838","journal-title":"IEEE Syst J"},{"key":"765_CR44","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1016\/j.future.2017.05.002","volume":"81","author":"K Mahmood","year":"2018","unstructured":"Mahmood K, Chaudhry SA, Naqvi H, Kumari S, Li X, Sangaiah AK (2018) An elliptic curve cryptography based lightweight authentication scheme for smart grid communication. Futur Gener Comput Syst 81:557\u2013565","journal-title":"Futur Gener Comput Syst"},{"issue":"3","key":"765_CR45","doi-asserted-by":"crossref","first-page":"1606","DOI":"10.1109\/JIOT.2017.2787800","volume":"5","author":"X Li","year":"2018","unstructured":"Li X, Peng J, Niu J, Wu F, Liao J, Choo KKR (2018) A robust and energy efficient authentication protocol for industrial Internet of Things. IEEE Internet Things J 5(3):1606\u20131615","journal-title":"IEEE Internet Things J"},{"issue":"1","key":"765_CR46","doi-asserted-by":"crossref","first-page":"461","DOI":"10.1109\/TSG.2014.2358225","volume":"6","author":"F Diao","year":"2015","unstructured":"Diao F, Zhang F, Cheng X (2015) A privacy-preserving smart metering scheme using linkable anonymous credential. IEEE Trans Smart Grid 6(1):461\u2013467","journal-title":"IEEE Trans Smart Grid"},{"key":"765_CR47","doi-asserted-by":"crossref","unstructured":"Kishimoto H, Yanai N, Okamura S (2017) An anonymous authentication protocol for smart grid. In: 2017 31st International Conference on Advanced Information Networking and Applications Workshops (WAINA). IEEE, pp 62\u201367","DOI":"10.1109\/WAINA.2017.41"},{"key":"765_CR48","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1016\/j.comnet.2016.11.009","volume":"117","author":"X Zhang","year":"2017","unstructured":"Zhang X, Wen M, Lu K, Lei J (2017) A privacy-aware data dissemination scheme for smart grid with abnormal data traceability. Comput Netw 117:32\u201341","journal-title":"Comput Netw"},{"key":"765_CR49","first-page":"1066","volume":"2015","author":"H Qu","year":"2015","unstructured":"Qu H, Shang P, Lin XJ, Sun L (2015) Cryptanalysis of a privacy-preserving smart metering scheme using linkable anonymous credential. IACR Cryptology ePrint Archive 2015:1066","journal-title":"IACR Cryptology ePrint Archive"},{"issue":"3","key":"765_CR50","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1007\/s001450010003","volume":"13","author":"D Pointcheval","year":"2000","unstructured":"Pointcheval D, Stern J (2000) Security arguments for digital signatures and blind signatures. J Cryptol 13 (3):361\u2013396","journal-title":"J Cryptol"},{"key":"765_CR51","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1016\/j.tcs.2012.01.027","volume":"461","author":"S Zeng","year":"2012","unstructured":"Zeng S, Jiang S, Qin Z (2012) An efficient conditionally anonymous ring signature in the random oracle model. Theor Comput Sci 461:106\u2013114","journal-title":"Theor Comput Sci"},{"key":"765_CR52","doi-asserted-by":"crossref","first-page":"727","DOI":"10.1016\/j.future.2017.08.042","volume":"82","author":"F Wu","year":"2018","unstructured":"Wu F, Li X, Sangaiah AK, Xu L, Kumari S, Wu L, Shen J (2018) A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks. Futur Gener Comput Syst 82:727\u2013737","journal-title":"Futur Gener Comput Syst"},{"key":"765_CR53","unstructured":"nsnamorg (2017) Ns-3.26. https:\/\/www.nsnam.org\/ns-3-26\/"}],"container-title":["Annals of Telecommunications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-020-00765-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12243-020-00765-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-020-00765-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T05:04:25Z","timestamp":1622523865000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12243-020-00765-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,1]]},"references-count":53,"journal-issue":{"issue":"7-8","published-print":{"date-parts":[[2020,8]]}},"alternative-id":["765"],"URL":"https:\/\/doi.org\/10.1007\/s12243-020-00765-4","relation":{},"ISSN":["0003-4347","1958-9395"],"issn-type":[{"value":"0003-4347","type":"print"},{"value":"1958-9395","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,6,1]]},"assertion":[{"value":"15 February 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 April 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 June 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}