{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T16:13:00Z","timestamp":1774368780190,"version":"3.50.1"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2024,5,31]],"date-time":"2024-05-31T00:00:00Z","timestamp":1717113600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,5,31]],"date-time":"2024-05-31T00:00:00Z","timestamp":1717113600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2024,10]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Electronic health records (EHRs) are important for the efficient management of healthcare data. However, Healthcare data travels across an open route, i.e., the Internet, making EHR security a difficult process to do. This puts healthcare data vulnerable to cyber assaults. A possible method for protecting EHRs is blockchain technology. In this work, we develop an EHR architecture based on blockchain, which ensures all stakeholder's safety and privacy. We analyze various security architectures used for EHRs and the standard encryption system is integrated with quantum computing (QC). To safeguard the conventional traditional encrypting system against quantum assaults, we provide a hybrid signature technique that combines the Elliptic Curve Digital Signature Algorithm (ECDSA) and\u00a0Dilithium within the anti-quantum lattice-based blind signature. Based on the difficulty of lattice problems over finite fields, Dilithium is a lattice-based signature method that is substantially safe against selected message assaults. The developed technique creates high entropy secret keys using the lattice basis delegation mechanism. The combination of ECDSA and Dilithium provides an efficient and secure signature system that is resilient to quantum attacks. The proposed scheme ensures that only authorized users with a defined role can use the database to access the data. We evaluate the efficiency of our scheme by comparing its performance to other state-of-the-art solutions in terms of transaction throughput, resource utilization, and communication cost. Results demonstrate that the developed technique outperforms the existing techniques in terms of efficiency and security.<\/jats:p>","DOI":"10.1007\/s40747-024-01477-1","type":"journal-article","created":{"date-parts":[[2024,5,31]],"date-time":"2024-05-31T10:03:23Z","timestamp":1717149803000},"page":"6117-6141","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["A blockchain-based hybrid encryption technique with anti-quantum signature for securing electronic health records"],"prefix":"10.1007","volume":"10","author":[{"given":"Shtwai","family":"Alsubai","sequence":"first","affiliation":[]},{"given":"Abdullah","family":"Alqahtani","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9099-8422","authenticated-orcid":false,"given":"Harish","family":"Garg","sequence":"additional","affiliation":[]},{"given":"Mohemmed","family":"Sha","sequence":"additional","affiliation":[]},{"given":"Abdu","family":"Gumaei","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,5,31]]},"reference":[{"issue":"8","key":"1477_CR1","doi-asserted-by":"publisher","first-page":"2865","DOI":"10.3390\/s21082865","volume":"21","author":"I Abunadi","year":"2021","unstructured":"Abunadi I, Kumar RL (2021) BSF-EHR: blockchain security framework for electronic health records of patients. Sensors 21(8):2865","journal-title":"Sensors"},{"key":"1477_CR2","volume":"65","author":"JS Lee","year":"2022","unstructured":"Lee JS, Chew CJ, Liu JY, Chen YC, Tsai KY (2022) Medical blockchain: data sharing and privacy-preserving of EHR based on smart contract. J Inform Secur Appl 65:103117","journal-title":"J Inform Secur Appl"},{"issue":"1","key":"1477_CR3","doi-asserted-by":"publisher","first-page":"1247","DOI":"10.1186\/s12913-022-08610-1","volume":"22","author":"N Wang","year":"2022","unstructured":"Wang N, Chen J, Chen W, Shi Z, Yang H, Liu P, Li X (2022) The effectiveness of case management for cancer patients: an umbrella review. BMC Health Serv Res 22(1):1247. https:\/\/doi.org\/10.1186\/s12913-022-08610-1","journal-title":"BMC Health Serv Res"},{"issue":"11","key":"1477_CR4","doi-asserted-by":"publisher","first-page":"7650","DOI":"10.1109\/TII.2021.3051607","volume":"17","author":"X Cai","year":"2021","unstructured":"Cai X, Geng S, Zhang J, Wu D, Cui Z, Zhang W, Chen J (2021) A sharding scheme-based many-objective optimization algorithm for enhancing security in blockchain-enabled industrial internet of things. IEEE Trans Industr Inf 17(11):7650\u20137658","journal-title":"IEEE Trans Industr Inf"},{"issue":"1","key":"1477_CR5","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1186\/s13643-022-01946-z","volume":"11","author":"S Hu","year":"2022","unstructured":"Hu S, Chen W, Hu H, Huang W, Chen J, Hu J (2022) Coaching to develop leadership for healthcare managers: a mixed-method systematic review protocol. Syst Rev 11(1):67. https:\/\/doi.org\/10.1186\/s13643-022-01946-z","journal-title":"Syst Rev"},{"key":"1477_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2023.107612","volume":"129","author":"MA Mohammed","year":"2024","unstructured":"Mohammed MA, Lakhan A, Zebari DA, Abd Ghani MK, Marhoon HA, Abdulkareem KH, Martinek R (2024) Securing healthcare data in industrial cyber-physical systems using combining deep learning and blockchain technology. Eng Appl Artif Intell 129:107612","journal-title":"Eng Appl Artif Intell"},{"key":"1477_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2023.107112","volume":"126","author":"AR Mishra","year":"2023","unstructured":"Mishra AR, Rani P, Alrasheedi AF, Dwivedi R (2023) Evaluating the blockchain-based healthcare supply chain using interval-valued Pythagorean fuzzy entropy-based decision support system. Eng Appl Artif Intell 126:107112","journal-title":"Eng Appl Artif Intell"},{"issue":"8","key":"1477_CR8","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1109\/MCOM.001.2200809","volume":"61","author":"Y Liu","year":"2023","unstructured":"Liu Y, Fang Z, Cheung MH, Cai W, Huang J (2023) Mechanism design for blockchain storage sustainability. IEEE Commun Mag 61(8):102\u2013107. https:\/\/doi.org\/10.1109\/MCOM.001.2200809","journal-title":"IEEE Commun Mag"},{"issue":"24","key":"1477_CR9","doi-asserted-by":"publisher","first-page":"22051","DOI":"10.1109\/JIOT.2023.3296595","volume":"10","author":"C Li","year":"2023","unstructured":"Li C, Dong M, Xin X, Li J, Chen X, Ota K (2023) Efficient privacy preserving in IoMT with blockchain and lightweight secret sharing. IEEE Internet Things J 10(24):22051\u201322064. https:\/\/doi.org\/10.1109\/JIOT.2023.3296595","journal-title":"IEEE Internet Things J"},{"issue":"24","key":"1477_CR10","doi-asserted-by":"publisher","first-page":"21656","DOI":"10.1109\/JIOT.2023.3317639","volume":"10","author":"J Yang","year":"2023","unstructured":"Yang J, Yang K, Xiao Z, Jiang H, Xu S, Dustdar S (2023) Improving commute experience for private car users via blockchain-enabled multitask learning. IEEE Internet Things J 10(24):21656\u201321669. https:\/\/doi.org\/10.1109\/JIOT.2023.3317639","journal-title":"IEEE Internet Things J"},{"issue":"4","key":"1477_CR11","doi-asserted-by":"publisher","first-page":"265","DOI":"10.4258\/hir.2020.26.4.265","volume":"26","author":"D Tith","year":"2020","unstructured":"Tith D, Lee JS, Suzuki H, Wijesundara WMAB, Taira N, Obi T, Ohyama N (2020) Patient consent management by a purpose-based consent model for electronic health record based on blockchain technology. Healthc Inform Res 26(4):265\u2013273","journal-title":"Healthc Inform Res"},{"key":"1477_CR12","doi-asserted-by":"publisher","first-page":"21091","DOI":"10.1109\/ACCESS.2020.2968985","volume":"8","author":"TM Fernandez-Carames","year":"2020","unstructured":"Fernandez-Carames TM, Fraga-Lamas P (2020) Towards post-quantum blockchain: a review on blockchain cryptography resistant to quantum computing attacks. IEEE access 8:21091\u201321116","journal-title":"IEEE access"},{"key":"1477_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2023.107399","volume":"128","author":"GS Kumar","year":"2024","unstructured":"Kumar GS, Premalatha K, Maheshwari GU, Kanna PR, Vijaya G, Nivaashini M (2024) Differential privacy scheme using Laplace mechanism and statistical method computation in deep neural network for privacy preservation. Eng Appl Artif Intell 128:107399","journal-title":"Eng Appl Artif Intell"},{"issue":"1","key":"1477_CR14","doi-asserted-by":"publisher","first-page":"373","DOI":"10.59934\/jaiea.v3i1.336","volume":"3","author":"RK Lubis","year":"2023","unstructured":"Lubis RK, Pardede AMH, Khair H (2023) Digital signature security analysis by applying the Elgamal algorithm and the idea method. J Artif Intell Eng Appl (JAIEA) 3(1):373\u2013382","journal-title":"J Artif Intell Eng Appl (JAIEA)"},{"issue":"3","key":"1477_CR15","doi-asserted-by":"publisher","first-page":"155014772199961","DOI":"10.1177\/1550147721999616","volume":"17","author":"Y Zuo","year":"2021","unstructured":"Zuo Y, Kang Z, Xu J, Chen Z (2021) BCAS: a blockchain-based ciphertext-policy attribute-based encryption scheme for cloud data security sharing. Int J Distrib Sens Netw 17(3):1550147721999616","journal-title":"Int J Distrib Sens Netw"},{"key":"1477_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2021.103304","volume":"198","author":"AE Azzaoui","year":"2022","unstructured":"Azzaoui AE, Sharma PK, Park JH (2022) Blockchain-based delegated quantum cloud architecture for medical big data security. J Netw Comput Appl 198:103304","journal-title":"J Netw Comput Appl"},{"issue":"7","key":"1477_CR17","doi-asserted-by":"publisher","first-page":"9736","DOI":"10.1109\/TITS.2021.3107011","volume":"23","author":"Z Zhou","year":"2021","unstructured":"Zhou Z, Wang M, Huang J, Lin S, Lv Z (2021) Blockchain in big data security for intelligent transportation with 6G. IEEE Trans Intell Transp Syst 23(7):9736\u20139746","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"2","key":"1477_CR18","doi-asserted-by":"publisher","first-page":"2193","DOI":"10.3233\/JIFS-189318","volume":"40","author":"Z Zhang","year":"2021","unstructured":"Zhang Z, Ren X (2021) Data security sharing method based on CP-ABE and blockchain. J Intell Fuzzy Syst 40(2):2193\u20132203","journal-title":"J Intell Fuzzy Syst"},{"issue":"3","key":"1477_CR19","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1177\/1063293X211008586","volume":"29","author":"A Siva Kumar","year":"2021","unstructured":"Siva Kumar A, Godfrey Winster S, Ramesh R (2021) Efficient sensitivity orient blockchain encryption for improved data security in cloud. Concurr Eng 29(3):249\u2013257","journal-title":"Concurr Eng"},{"issue":"1","key":"1477_CR20","doi-asserted-by":"publisher","first-page":"373","DOI":"10.59934\/jaiea.v3i1.336","volume":"3","author":"RK Lubis","year":"2023","unstructured":"Lubis RK, Pardede AMH, Khair H (2023) Digital signature security analysis by applying the Elgamal algorithm and the idea method. J Artif Intell Eng Appl 3(1):373\u2013382","journal-title":"J Artif Intell Eng Appl"},{"key":"1477_CR21","doi-asserted-by":"crossref","unstructured":"Xie YY, Chen XB, Yang YX (2022) A new lattice-based blind ring signature for completely anonymous blockchain transaction systems.\u00a0Secur Commun Netw\u00a02022","DOI":"10.1155\/2022\/4052029"},{"key":"1477_CR22","doi-asserted-by":"publisher","first-page":"1525","DOI":"10.1007\/s11277-020-07747-8","volume":"116","author":"L Deng","year":"2021","unstructured":"Deng L, He X, Xia T (2021) Secure identity-based blind signature scheme for online transactions. Wirel Pers Commun 116:1525\u20131537","journal-title":"Wirel Pers Commun"},{"key":"1477_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.bdr.2021.100268","volume":"26","author":"H Yi","year":"2021","unstructured":"Yi H, Li Y, Wang M, Yan Z, Nie Z (2021) An efficient blockchain consensus algorithm based on post-quantum threshold signature. Big Data Res 26:100268","journal-title":"Big Data Res"},{"key":"1477_CR24","doi-asserted-by":"publisher","first-page":"132472","DOI":"10.1109\/ACCESS.2022.3227394","volume":"10","author":"Y Quan","year":"2022","unstructured":"Quan Y (2022) Improving Bitcoin\u2019s post-quantum transaction efficiency with a novel lattice-based aggregate signature scheme based on CRYSTALS-dilithium and a STARK protocol. IEEE Access 10:132472\u2013132482","journal-title":"IEEE Access"},{"issue":"1","key":"1477_CR25","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/j.icte.2021.06.002","volume":"8","author":"R Johari","year":"2022","unstructured":"Johari R, Kumar V, Gupta K, Vidyarthi DP (2022) BLOSOM: BLOckchain technology for Security of Medical records. ICT Express 8(1):56\u201360","journal-title":"ICT Express"},{"key":"1477_CR26","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1016\/j.future.2020.04.042","volume":"111","author":"F Shahid","year":"2020","unstructured":"Shahid F, Khan A (2020) Smart digital signatures (SDS): a post-quantum digital signature scheme for distributed ledgers. Fut Gen Comput Syst 111:241\u2013253","journal-title":"Fut Gen Comput Syst"},{"key":"1477_CR27","volume":"65","author":"JS Lee","year":"2022","unstructured":"Lee JS, Chew CJ, Liu JY, Chen YC, Tsai KY (2022) Medical blockchain: data sharing and privacy preserving of EHR based on smart contract. J Inform Secur Appl 65:103117","journal-title":"J Inform Secur Appl"},{"key":"1477_CR28","volume":"26","author":"R Mishra","year":"2022","unstructured":"Mishra R, Ramesh D, Edla DR, Qi L (2022) DS-Chain: a secure and auditable multi-cloud assisted EHR storage model on efficient deletable blockchain. J Ind Inf Integr 26:100315","journal-title":"J Ind Inf Integr"},{"key":"1477_CR29","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1016\/j.ins.2020.08.032","volume":"546","author":"C Li","year":"2021","unstructured":"Li C, Tian Y, Chen X, Li J (2021) An efficient anti-quantum lattice-based blind signature for blockchain-enabled systems. Inf Sci 546:253\u2013264","journal-title":"Inf Sci"},{"key":"1477_CR30","doi-asserted-by":"publisher","first-page":"942","DOI":"10.1016\/j.ins.2022.09.028","volume":"612","author":"Z Qu","year":"2022","unstructured":"Qu Z, Zhang Z, Zheng M (2022) A quantum blockchain-enabled framework for secure private electronic medical records in Internet of Medical Things. Inf Sci 612:942\u2013958","journal-title":"Inf Sci"},{"key":"1477_CR31","doi-asserted-by":"crossref","unstructured":"Narayanan U, Paul V, Joseph S (2021) Decentralized blockchain based authentication for secure data sharing in Cloud-IoT: DeBlock-Sec. J Ambient Intell Hum Comput:1\u201319","DOI":"10.1007\/s12652-021-02929-z"},{"key":"1477_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.58496\/MJCSC\/2021\/001","volume":"2021","author":"M Yaseen","year":"2021","unstructured":"Yaseen M, Mahadi B, Omar AH (2021) Blockchain technology applications, concerns and recommendations for public sector. Mesopotamian J Comput Sci 2021:1\u20136. https:\/\/doi.org\/10.58496\/MJCSC\/2021\/001","journal-title":"Mesopotamian J Comput Sci"},{"key":"1477_CR33","doi-asserted-by":"publisher","first-page":"5","DOI":"10.58496\/MJCSC\/2022\/006","volume":"2022","author":"S Abdulrahman","year":"2022","unstructured":"Abdulrahman S, Useng M (2022) Blockchain and distributed ledger technologies for IoT security: a survey paper. Mesopotamian J Comput Sci 2022:5\u20138. https:\/\/doi.org\/10.58496\/MJCSC\/2022\/006","journal-title":"Mesopotamian J Comput Sci"},{"issue":"5","key":"1477_CR34","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1109\/MNET.011.1900536","volume":"34","author":"B Cao","year":"2020","unstructured":"Cao B, Wang X, Zhang W, Song H, Lv Z (2020) A many-objective optimization model of industrial internet of things based on private blockchain. IEEE Netw 34(5):78\u201383. https:\/\/doi.org\/10.1109\/MNET.011.1900536","journal-title":"IEEE Netw"},{"issue":"1","key":"1477_CR35","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/s11128-022-03786-1","volume":"22","author":"Y Huang","year":"2022","unstructured":"Huang Y, Xu G, Song X (2022) An improved efficient identity-based quantum signature scheme. Quant Inf Process 22(1):36","journal-title":"Quant Inf Process"},{"issue":"10","key":"1477_CR36","doi-asserted-by":"publisher","DOI":"10.1111\/exsy.12978","volume":"39","author":"A Mehbodniya","year":"2022","unstructured":"Mehbodniya A, Webber JL, Neware R, Arslan F, Pamba RV, Shabaz M (2022) Modified lamport merkle digital signature blockchain framework for authentication of internet of things healthcare data. Expert Syst 39(10):e12978","journal-title":"Expert Syst"},{"key":"1477_CR37","doi-asserted-by":"crossref","unstructured":"Oudah MS, Maolood AT (2022). Lightweight authentication model for IoT environments based on enhanced elliptic curve digital signature and shamir secret share. Int J Intell Eng Syst15(5)","DOI":"10.22266\/ijies2022.1031.08"},{"issue":"2","key":"1477_CR38","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/s10723-023-09643-4","volume":"21","author":"H Yi","year":"2023","unstructured":"Yi H (2023) Machine learning method with applications in hardware security of post-quantum cryptography. J Grid Comput 21(2):19","journal-title":"J Grid Comput"},{"key":"1477_CR39","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1007\/s11277-020-07585-8","volume":"115","author":"VJ Babu","year":"2020","unstructured":"Babu VJ, Jose MV (2020) Improved merkle hash tree-based one-time signature scheme for capability-enhanced security enforcing architecture for named data networking. Wireless Pers Commun 115:557\u2013574","journal-title":"Wireless Pers Commun"},{"key":"1477_CR40","unstructured":"Oraei H, Dehkordi MH (2022) A new variant of the winternitz one time signature based on graded encoding schemes. ISeCure 14(1)"},{"key":"1477_CR41","doi-asserted-by":"publisher","DOI":"10.1016\/j.cmpb.2021.106595","volume":"215","author":"YL Lee","year":"2022","unstructured":"Lee YL, Lee HA, Hsu CY, Kung HH, Chiu HW (2022) SEMRES-A triple security protected blockchain based medical record exchange structure. Comput Methods Programs Biomed 215:106595","journal-title":"Comput Methods Programs Biomed"},{"key":"1477_CR42","doi-asserted-by":"crossref","unstructured":"Chen X, Xu S, Qin T, Cui Y, Gao S, Kong W (2022) AQ\u2013ABS: anti-quantum attribute-based signature for EMRs sharing with blockchain. In: 2022 IEEE Wireless Communications and Networking Conference (WCNC) (pp. 1176\u20131181). IEEE","DOI":"10.1109\/WCNC51071.2022.9771830"},{"issue":"6","key":"1477_CR43","doi-asserted-by":"publisher","first-page":"891","DOI":"10.1631\/FITEE.2000099","volume":"22","author":"H Yu","year":"2021","unstructured":"Yu H, Bai L (2021) Post-quantum blind signcryption scheme from lattice. Front Inform Technol Electron Eng 22(6):891\u2013901","journal-title":"Front Inform Technol Electron Eng"},{"issue":"8","key":"1477_CR44","first-page":"6901","volume":"20","author":"GD Makkar","year":"2022","unstructured":"Makkar GD, Semwal P, Sharma HC, Kero A, Arora M, Sharma V (2022) Smart healthcare system using post quantum technique and blockchain. NeuroQuantology 20(8):6901","journal-title":"NeuroQuantology"},{"key":"1477_CR45","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2023.3271859","author":"S Han","year":"2023","unstructured":"Han S, Ding H, Zhao S, Ren S, Wang Z, Lin J, Zhou S (2023) Practical and robust federated learning with highly scalable regression training. IEEE Trans Neural Netw Learn Syst. https:\/\/doi.org\/10.1109\/TNNLS.2023.3271859","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"1477_CR46","doi-asserted-by":"publisher","first-page":"61","DOI":"10.58496\/MJBD\/2023\/009","volume":"2023","author":"IM Bala","year":"2023","unstructured":"Bala IM, Mijwil M, Ali G, Sad\u0131ko\u011flu E (2023) Analysing the connection between AI and industry 4.0 from a cybersecurity perspective: defending the smart revolution. Mesopotamian J Big Data 2023:61\u201367. https:\/\/doi.org\/10.58496\/MJBD\/2023\/009","journal-title":"Mesopotamian J Big Data"},{"issue":"1","key":"1477_CR47","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1186\/s13643-022-01946-z","volume":"11","author":"S Hu","year":"2022","unstructured":"Hu S, Chen W, Hu H, Huang W, Chen J, Hu J (2022) Coaching to develop leadership for healthcare managers: a mixed-method systematic review protocol. Syst Rev 11(1):67. https:\/\/doi.org\/10.1186\/s13643-022-01946-z","journal-title":"Syst Rev"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-024-01477-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-024-01477-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-024-01477-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,14]],"date-time":"2024-09-14T15:08:08Z","timestamp":1726326488000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-024-01477-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,31]]},"references-count":47,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2024,10]]}},"alternative-id":["1477"],"URL":"https:\/\/doi.org\/10.1007\/s40747-024-01477-1","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"value":"2199-4536","type":"print"},{"value":"2198-6053","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,5,31]]},"assertion":[{"value":"17 June 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 May 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 May 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}