{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T01:43:37Z","timestamp":1755999817944,"version":"3.37.3"},"reference-count":55,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2021,10,29]],"date-time":"2021-10-29T00:00:00Z","timestamp":1635465600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,10,29]],"date-time":"2021-10-29T00:00:00Z","timestamp":1635465600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2022,4]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>With the rapid advancement and growth of computer networks, there have been greater and greater demands for remote user password authentication protocols. In current ages, smartcard-based authentication protocol has formed the standard with their incredibly insubstantial, user-friendly equipment and low-cost apps. In this study, we proposed an effective robust authentication protocol using the conformable chaotic map, where a conformable calculus is a branch of newly appearing fractional calculus. It has a magnificent property, because it formulates using a controller term. We shall also offer formal proof of smooth execution of the proposed authenticated protocol. Our new protocol is more secure as compared to several comparable protocols.<\/jats:p>","DOI":"10.1007\/s40747-021-00555-y","type":"journal-article","created":{"date-parts":[[2021,10,29]],"date-time":"2021-10-29T08:02:36Z","timestamp":1635494556000},"page":"973-987","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Conformal Chebyshev chaotic map-based remote user password authentication protocol using smart card"],"prefix":"10.1007","volume":"8","author":[{"given":"Chandrashekhar","family":"Meshram","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5453-3791","authenticated-orcid":false,"given":"Sarita Gajbhiye","family":"Meshram","sequence":"additional","affiliation":[]},{"given":"Rabha W.","family":"Ibrahim","sequence":"additional","affiliation":[]},{"given":"Hamid A.","family":"Jalab","sequence":"additional","affiliation":[]},{"given":"Sajjad Shaukat","family":"Jamal","sequence":"additional","affiliation":[]},{"given":"Sharad Kumar","family":"Barve","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,10,29]]},"reference":[{"key":"555_CR1","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1109\/7384.963463","volume":"1","author":"L Kocarev","year":"2001","unstructured":"Kocarev L (2001) Chaos-based cryptography: a brief overview. IEEE Circ Syst Mag 1:6\u201321","journal-title":"IEEE Circ Syst Mag"},{"issue":"3","key":"555_CR2","doi-asserted-by":"crossref","first-page":"1283","DOI":"10.1016\/j.chaos.2007.06.030","volume":"39","author":"S Han","year":"2009","unstructured":"Han S, Chang E (2009) Chaotic map based key agreement with\/out clock synchronization. Choas Solit Fract 39(3):1283\u20131289","journal-title":"Choas Solit Fract"},{"key":"555_CR3","unstructured":"Hwu F (1993) The interpolating random spline cryptosystem and the chaotic-map public-key cryptosystem. Ph.D. thesis, University of Missouri Rolla"},{"key":"555_CR4","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T ElGmal","year":"1995","unstructured":"ElGmal T (1995) A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans Inf Theory 31:469\u2013472","journal-title":"IEEE Trans Inf Theory"},{"key":"555_CR5","doi-asserted-by":"crossref","first-page":"377","DOI":"10.1002\/dac.2368","volume":"27","author":"BL Chen","year":"2014","unstructured":"Chen BL, Kuo WC, Wu LC (2014) Robust smartcard-based remote user password authentication scheme. Int J Commun Syst 27:377\u2013389","journal-title":"Int J Commun Syst"},{"issue":"10","key":"555_CR6","doi-asserted-by":"crossref","first-page":"2215","DOI":"10.1002\/dac.2468","volume":"27","author":"CG Ma","year":"2014","unstructured":"Ma CG, Wang D, Zhao SD (2014) Security flaws in two improved remote user authentication schemes using smart cards. Int J Commun Syst 27(10):2215\u20132227","journal-title":"Int J Commun Syst"},{"issue":"4","key":"555_CR7","doi-asserted-by":"crossref","first-page":"723","DOI":"10.1016\/j.csi.2008.09.006","volume":"31","author":"J Xu","year":"2009","unstructured":"Xu J, Zhu WT, Feng DG (2009) An improved smartcard-based password authentication scheme with provable security. Comput Stand Interfaces 31(4):723\u2013728","journal-title":"Comput Stand Interfaces"},{"issue":"5","key":"555_CR8","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1016\/j.csi.2010.03.008","volume":"32","author":"R Song","year":"2010","unstructured":"Song R (2010) Advanced smartcard-based password authentication protocol. Comput Stand Interfaces 32(5):321\u2013325","journal-title":"Comput Stand Interfaces"},{"key":"555_CR9","unstructured":"Song R, Korba L, Yee G (2007) Analysis of smart card-based remote user authentication schemes. In: Proceedings of the 2007 International Conference on Security and Management. Las Vegas, USA, pp 323\u2013329"},{"key":"555_CR10","doi-asserted-by":"crossref","unstructured":"Sood SK, Sarje AK, Singh K (2010) An improvement of Xu et al.\u2019s authentication scheme using smartcards. In: Proceedings of the Third Annual ACM Bangalore Conference, Bangalore, Karnataka, India, pp 17\u201325","DOI":"10.1145\/1754288.1754303"},{"key":"555_CR11","first-page":"571","volume-title":"Side-channel analysis, encyclopedia of cryptography and security","author":"M Joye","year":"2010","unstructured":"Joye M, Olivier F (2010) Side-channel analysis, encyclopedia of cryptography and security. Kluwer Academic Publishers Springer, Berlin, pp 571\u2013576"},{"key":"555_CR12","doi-asserted-by":"crossref","unstructured":"Kocher P, Jaffe J, Jun B (1999) Differential power analysis. In: Proceedings of Advances in Cryptology (Crypto\u201999), LNCS. Springer Berlin Heidelberg, pp 388\u2013397","DOI":"10.1007\/3-540-48405-1_25"},{"issue":"5","key":"555_CR13","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"TS Messerges","year":"2002","unstructured":"Messerges TS, Dabbish EA, Sloan RH (2002) Examining smart card security under the threat of power analysis attacks. IEEE Trans Comput 51(5):541\u2013552","journal-title":"IEEE Trans Comput"},{"issue":"3","key":"555_CR14","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1002\/dac.1158","volume":"24","author":"C Chen","year":"2011","unstructured":"Chen C, He DJ, Chan SM, Bu JJ, Gao Y, Fan R (2011) Lightweight and provably secure user authentication with anonymity for the global mobility network. Int J Commun Syst 24(3):347\u2013362","journal-title":"Int J Commun Syst"},{"key":"555_CR15","doi-asserted-by":"crossref","first-page":"1365","DOI":"10.1016\/j.jnca.2013.02.034","volume":"36","author":"X Li","year":"2013","unstructured":"Li X, Niu J, Khan MK, Liao J (2013) An enhanced smartcard based remote user password authentication scheme. J Netw Comput Appl 36:1365\u20131371","journal-title":"J Netw Comput Appl"},{"issue":"11","key":"555_CR16","doi-asserted-by":"crossref","first-page":"1708","DOI":"10.1002\/dac.2793","volume":"29","author":"SKH Islam","year":"2016","unstructured":"Islam SKH (2016) Design and analysis of an improved smartcard\u2013based remote user password authentication scheme. Int J Commun Syst 29(11):1708\u20131719","journal-title":"Int J Commun Syst"},{"issue":"2","key":"555_CR17","doi-asserted-by":"crossref","first-page":"569","DOI":"10.1007\/s11277-016-3293-x","volume":"89","author":"X Li","year":"2016","unstructured":"Li X, Niu J, Kumari S, Islam SKH, Wu F, Khan MK, Das AK (2016) A novel chaotic maps-based user authentication and key agreement protocol for multi-server environments with provable security. Wirel Pers Commun 89(2):569\u2013597","journal-title":"Wirel Pers Commun"},{"issue":"14","key":"555_CR18","volume":"30","author":"M Luo","year":"2017","unstructured":"Luo M, Zhang Y, Khan MK, He D (2017) An efficient chaos-based two-party key agreement protocol with provable security. Int J Commun Syst 30(14):e3288","journal-title":"Int J Commun Syst"},{"key":"555_CR19","doi-asserted-by":"crossref","first-page":"2495","DOI":"10.1007\/s00500-017-2504-z","volume":"22","author":"CT Li","year":"2018","unstructured":"Li CT, Chen CL, Lee CC, Weng CY, Chen CM (2018) A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps. Soft Comput 22:2495\u20132506","journal-title":"Soft Comput"},{"issue":"4","key":"555_CR20","first-page":"1","volume":"15","author":"Y Zhao","year":"2019","unstructured":"Zhao Y, Li S, Jiang L, Liu T (2019) Security-enhanced three-factor remote user authentication scheme based on Chebyshev chaotic maps. Int J Distrib Sens Netw 15(4):1\u201312","journal-title":"Int J Distrib Sens Netw"},{"key":"555_CR21","doi-asserted-by":"publisher","DOI":"10.1080\/1206212X.2019.1682238","author":"D Dharminder","year":"2019","unstructured":"Dharminder D, Gupta P (2019) Security analysis and application of Chebyshev Chaotic map in the authentication protocols. Int J Comput Appl. https:\/\/doi.org\/10.1080\/1206212X.2019.1682238","journal-title":"Int J Comput Appl"},{"issue":"4","key":"555_CR22","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1049\/iet-its.2019.0250","volume":"14","author":"D Mishra","year":"2020","unstructured":"Mishra D, Kumar V, Dharminder D, Rana S (2020) SFVCC: chaotic map-based security framework for vehicular cloud computing. IET Intel Transp Syst 14(4):241\u2013249","journal-title":"IET Intel Transp Syst"},{"key":"555_CR23","doi-asserted-by":"crossref","unstructured":"Meshram C, Ibrahim RW, Deng L, Shende SW, Meshram SG, Barve SK (2021) A Robust smart card and remote user password-based authentication protocol using extended chaotic-maps under smart cities environment, soft computing. Accepted","DOI":"10.1109\/CITS49457.2020.9232622"},{"key":"555_CR24","doi-asserted-by":"crossref","first-page":"374","DOI":"10.1016\/j.physa.2016.05.045","volume":"460","author":"GC Wu","year":"2016","unstructured":"Wu GC, Baleanu D, Xie HP, Chen FL (2016) Chaos synchronization of fractional chaotic maps based on the stability condition. Physica A 460:374\u2013383","journal-title":"Physica A"},{"key":"555_CR25","doi-asserted-by":"crossref","first-page":"553","DOI":"10.1016\/j.ijleo.2018.04.054","volume":"168","author":"YR Bai","year":"2018","unstructured":"Bai YR, Baleanu D, Wu GC (2018) A novel shuffling technique based on fractional chaotic maps. Optik 168:553\u2013562","journal-title":"Optik"},{"issue":"8","key":"555_CR26","first-page":"083","volume":"29","author":"GC Wu","year":"2019","unstructured":"Wu GC, Deng ZG, Baleanu D, Zeng DQ (2019) New variable-order fractional chaotic systems for fast image encryption. Chaos 29(8):083\u2013103","journal-title":"Chaos"},{"key":"555_CR27","volume-title":"Chebyshev polynomials","author":"JC Mason","year":"2003","unstructured":"Mason JC, Handscomb DC (2003) Chebyshev polynomials. Chapman & Hall\/CRC, Boca Raton"},{"issue":"7","key":"555_CR28","doi-asserted-by":"crossref","first-page":"1382","DOI":"10.1109\/TCSI.2005.851701","volume":"52","author":"P Bergamo","year":"2005","unstructured":"Bergamo P, D\u2019Arco P, Santis A, Kocarev L (2005) Security of public key cryptosystems based on Chebyshev polynomials. IEEE Trans Circ Syst I 52(7):1382\u20131393","journal-title":"IEEE Trans Circ Syst I"},{"issue":"3","key":"555_CR29","doi-asserted-by":"crossref","first-page":"1283","DOI":"10.1016\/j.chaos.2007.06.030","volume":"39","author":"S Han","year":"2009","unstructured":"Han S, Chang E (2009) Chaotic map based key agreement with\/out clock synchronization. Choas Solit Fractals 39(3):1283\u20131289","journal-title":"Choas Solit Fractals"},{"issue":"3","key":"555_CR30","doi-asserted-by":"crossref","first-page":"669","DOI":"10.1016\/j.chaos.2006.09.047","volume":"37","author":"L Zhang","year":"2008","unstructured":"Zhang L (2008) Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos Solit Fractals 37(3):669\u2013674","journal-title":"Chaos Solit Fractals"},{"key":"555_CR31","doi-asserted-by":"crossref","unstructured":"Canetti R, Krawczyk H (2001) Analysis of key-exchange protocols and their use for building secure channels. In: Proc. Int. Conf. Theory Appl. Cryptograph. Techn. Adv. Cryptol. (EUROCRYPT). Tyrol, Austria: Springer, pp 453\u2013474","DOI":"10.1007\/3-540-44987-6_28"},{"key":"555_CR32","doi-asserted-by":"crossref","unstructured":"Canetti R, Krawczyk H (2002) Universally composable notions of key exchange and secure channels. In: Proc. Int. Conf. Theory Appl. Cryptograph. Techn. Adv. Cryptol. (EUROCRYPT), Amsterdam, The Netherlands, pp 337\u2013351","DOI":"10.1007\/3-540-46035-7_22"},{"issue":"5","key":"555_CR33","doi-asserted-by":"crossref","first-page":"824","DOI":"10.1109\/TDSC.2016.2616876","volume":"15","author":"S Chatterjee","year":"2018","unstructured":"Chatterjee S, Roy S, Das AK, Chattopadhyay S, Kumar N, Vasilakos AV (2018) Secure biometric-based authentication scheme using chebyshev chaotic map for multi-server environment. IEEE Trans Depend Secure Comput 15(5):824\u2013839","journal-title":"IEEE Trans Depend Secure Comput"},{"issue":"5","key":"555_CR34","doi-asserted-by":"crossref","first-page":"4359","DOI":"10.1109\/TVT.2017.2780183","volume":"67","author":"A Dua","year":"2018","unstructured":"Dua A, Kumar N, Das AK, Susilo W (2018) Secure message communication protocol among vehicles in smart city. IEEE Trans Veh Technol 67(5):4359\u20134373","journal-title":"IEEE Trans Veh Technol"},{"issue":"5","key":"555_CR35","doi-asserted-by":"crossref","first-page":"942","DOI":"10.1109\/TDSC.2018.2828306","volume":"17","author":"J Srinivas","year":"2020","unstructured":"Srinivas J, Das AK, Kumar N, Rodrigues J (2020) Cloud centric authentication for wearable healthcare monitoring system. IEEE Trans Depend Secure Comput 17(5):942\u2013956","journal-title":"IEEE Trans Depend Secure Comput"},{"key":"555_CR36","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1016\/j.comnet.2017.12.007","volume":"131","author":"D Chattaraj","year":"2018","unstructured":"Chattaraj D, Sarma M, Das AK (2018) A new two-server authentication and key agreement protocol for accessing secure cloud services. Comput Netw 131:144\u2013164","journal-title":"Comput Netw"},{"key":"555_CR37","first-page":"388","volume-title":"Differential power analysis. In advances in cryptology\u2014CRYPTO","author":"P Kocher","year":"1999","unstructured":"Kocher P, Jaffe J, Jun B (1999) Differential power analysis. In advances in cryptology\u2014CRYPTO. Springer, Santa Barbara, pp 388\u2013397"},{"issue":"5","key":"555_CR38","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"TS Messerges","year":"2002","unstructured":"Messerges TS, Dabbish EA, Sloan RH (2002) Examining smart-card security under the threat of power analysis attacks. IEEE Trans Comput 51(5):541\u2013552","journal-title":"IEEE Trans Comput"},{"issue":"9","key":"555_CR39","doi-asserted-by":"crossref","first-page":"1953","DOI":"10.1109\/TIFS.2015.2439964","volume":"10","author":"V Odelu","year":"2015","unstructured":"Odelu V, Das AK, Goswami A (2015) A secure biometrics-based multiserver authentication protocol using smart cards. IEEE Trans Inf Foren Secur 10(9):1953\u20131966","journal-title":"IEEE Trans Inf Foren Secur"},{"key":"555_CR40","doi-asserted-by":"crossref","first-page":"3848","DOI":"10.1016\/j.cnsns.2012.02.021","volume":"17","author":"F Chen","year":"2012","unstructured":"Chen F, Liao X, Wong KW, Han Q, Li Y (2012) Period distribution analysis of some linear maps. Commun Nonlinear Sci Numer Simul 17:3848\u20133856","journal-title":"Commun Nonlinear Sci Numer Simul"},{"issue":"3","key":"555_CR41","doi-asserted-by":"crossref","first-page":"747","DOI":"10.1007\/s00500-018-3112-2","volume":"23","author":"C Meshram","year":"2019","unstructured":"Meshram C, Li CT, Meshram SG (2019) An efficient online\/offline ID-based short signature procedure using extended chaotic maps. Soft Comput 23(3):747\u2013753","journal-title":"Soft Comput"},{"issue":"16","key":"555_CR42","doi-asserted-by":"crossref","first-page":"6937","DOI":"10.1007\/s00500-018-3332-5","volume":"23","author":"C Meshram","year":"2019","unstructured":"Meshram C, Lee CC, Meshram SG, Li CT (2019) An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem. Soft Comput 23(16):6937\u20136946","journal-title":"Soft Comput"},{"key":"555_CR43","unstructured":"Anderson DR, Camrud E, Ulness DJ. On the nature of the conformable derivative and its applications to physics. arXiv preprint arXiv:1810.02005, 2018."},{"issue":"1","key":"555_CR44","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M Burrows","year":"1990","unstructured":"Burrows M, Abadi M, Needham R (1990) A logic of authentication. ACM Trans Comput Syst 8(1):18\u201336","journal-title":"ACM Trans Comput Syst"},{"key":"555_CR45","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/719470","author":"AK Das","year":"2014","unstructured":"Das AK, Odelu V, Goswami A (2014) A Robust and Effective Smart-Card-Based Remote User Authentication Mechanism Using Hash Function. Sci World J. https:\/\/doi.org\/10.1155\/2014\/719470","journal-title":"Sci World J"},{"issue":"2","key":"555_CR46","doi-asserted-by":"crossref","first-page":"290","DOI":"10.1002\/dac.2830","volume":"29","author":"CC Chang","year":"2016","unstructured":"Chang CC, Cheng TF, Hsueh WY (2016) A robust and efficient dynamic identity-based multi-server authentication scheme using smart cards. Int J Commun Syst 29(2):290\u2013306","journal-title":"Int J Commun Syst"},{"issue":"12","key":"555_CR47","doi-asserted-by":"crossref","first-page":"1639","DOI":"10.1002\/dac.2428","volume":"25","author":"HB Tang","year":"2012","unstructured":"Tang HB, Liu XS (2012) Cryptanalysis of a dynamic ID-based remote user authentication with key agreement scheme. Int J Commun Syst 25(12):1639\u20131644","journal-title":"Int J Commun Syst"},{"issue":"1","key":"555_CR48","volume":"30","author":"MS Farash","year":"2017","unstructured":"Farash MS (2017) An improved password-based authentication scheme for session initiation protocol using smart cards without verification table. Int J Commun Syst 30(1):e2879","journal-title":"Int J Commun Syst"},{"key":"555_CR49","doi-asserted-by":"crossref","first-page":"878","DOI":"10.1016\/j.scs.2018.06.004","volume":"41","author":"AG Reddy","year":"2018","unstructured":"Reddy AG, Suresh D, Phaneendra K, Ji SS, Odelu V (2018) Provably secure pseudo-identity based device authentication for smart cities environment. Sustain Cities Soc 41:878\u2013885","journal-title":"Sustain Cities Soc"},{"issue":"6","key":"555_CR50","first-page":"1053","volume":"19","author":"J Moon","year":"2017","unstructured":"Moon J, Lee D, Jung J, Won D (2017) Improvement of efficient and secure smart card-based password authentication scheme. Int J Netw Secur 19(6):1053\u20131061","journal-title":"Int J Netw Secur"},{"issue":"2","key":"555_CR51","first-page":"358","volume":"22","author":"H-T Pan","year":"2020","unstructured":"Pan H-T, Yang H-W, Hwang M-S (2020) An enhanced secure smart card-based password authentication scheme. Int J Netw Secur 22(2):358\u2013363","journal-title":"Int J Netw Secur"},{"issue":"12","key":"555_CR52","doi-asserted-by":"crossref","first-page":"3939","DOI":"10.1002\/dac.2590","volume":"27","author":"S Kumari","year":"2014","unstructured":"Kumari S, Khan MK (2014) Cryptanalysis and improvement of \u2018a robust smart-card-based remote user password authentication scheme. Int J Commun Syst 27(12):3939\u20133955","journal-title":"Int J Commun Syst"},{"key":"555_CR53","doi-asserted-by":"crossref","first-page":"4670","DOI":"10.1016\/j.physleta.2010.09.041","volume":"374","author":"MB Algehawi","year":"2010","unstructured":"Algehawi MB, Samsudin A (2010) A new identity-based encryption (IBE) scheme using extended Chebyshev polynomial over finite fields Zp. Phys Lett A 374:4670\u20134674","journal-title":"Phys Lett A"},{"key":"555_CR54","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1016\/j.cmpb.2016.07.022","volume":"135","author":"MH Ibrahim","year":"2016","unstructured":"Ibrahim MH, Kumari S, Das AK, Wazid M, Odelu V (2016) Secure anonymous mutual authentication for star two-tier wireless body area networks. Comput Methods Programs Biomed 135:37\u201350","journal-title":"Comput Methods Programs Biomed"},{"issue":"14","key":"555_CR55","doi-asserted-by":"crossref","first-page":"8905","DOI":"10.1007\/s00500-021-05781-7","volume":"25","author":"C Meshram","year":"2021","unstructured":"Meshram C, Ibrahim RW, Obaidat MS, Sadoun B, Meshram SG, Tembhurne JV (2021) An effective mobile-healthcare emerging emergency medical system using conformable chaotic maps. Soft Comput 25(14):8905\u20138920","journal-title":"Soft Comput"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-021-00555-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-021-00555-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-021-00555-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,29]],"date-time":"2022-04-29T17:34:55Z","timestamp":1651253695000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-021-00555-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,29]]},"references-count":55,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,4]]}},"alternative-id":["555"],"URL":"https:\/\/doi.org\/10.1007\/s40747-021-00555-y","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"type":"print","value":"2199-4536"},{"type":"electronic","value":"2198-6053"}],"subject":[],"published":{"date-parts":[[2021,10,29]]},"assertion":[{"value":"25 October 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 September 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 October 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have declared no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human or animal subjects.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethics requirements"}}]}}