{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T17:53:07Z","timestamp":1775065987527,"version":"3.50.1"},"reference-count":53,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2020,12,10]],"date-time":"2020-12-10T00:00:00Z","timestamp":1607558400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,12,10]],"date-time":"2020-12-10T00:00:00Z","timestamp":1607558400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61832018"],"award-info":[{"award-number":["61832018"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["CCF Trans. HPC"],"published-print":{"date-parts":[[2021,3]]},"DOI":"10.1007\/s42514-020-00060-7","type":"journal-article","created":{"date-parts":[[2020,12,10]],"date-time":"2020-12-10T09:07:24Z","timestamp":1607591244000},"page":"31-56","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["A dynamically configurable LFSR-based PUF design against machine learning attacks"],"prefix":"10.1007","volume":"3","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7525-2825","authenticated-orcid":false,"given":"Shen","family":"Hou","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5817-1908","authenticated-orcid":false,"given":"Ding","family":"Deng","sequence":"additional","affiliation":[]},{"given":"Zhenyu","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9809-7060","authenticated-orcid":false,"given":"Jiahe","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Shaoqing","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Guo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,12,10]]},"reference":[{"key":"60_CR1","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/s10776-018-0391-6","volume":"25","author":"F Afghah","year":"2018","unstructured":"Afghah, F., Cambou, B., Abedini, M., Zeadally, S.: A ReRAM physically unclonable function (ReRAM PUF)-based approach to enhance authentication security in software defined wireless networks. Int. J. Wirel. Inf. Netw. 25, 117\u2013129 (2018). https:\/\/doi.org\/10.1007\/s10776-018-0391-6","journal-title":"Int. J. Wirel. Inf. Netw."},{"key":"60_CR2","doi-asserted-by":"crossref","unstructured":"Aseeri, A., Zhuang, Y., Alkatheiri, M.: A machine learning-based security vulnerability study on XOR PUFs for resource-constraint internet of things. Presented at the July 1 (2018)","DOI":"10.1109\/ICIOT.2018.00014"},{"key":"60_CR3","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1007\/978-3-662-48324-4_27","volume-title":"Cryptographic hardware and embedded systems\u2014CHES 2015","author":"GT Becker","year":"2015","unstructured":"Becker, G.T.: The gap between promise and reality: on the insecurity of XOR arbiter PUFs. In: G\u00fcneysu, T., Handschuh, H. (eds.) Cryptographic hardware and embedded systems\u2014CHES 2015, pp. 535\u2013555. Springer, Berlin (2015a)"},{"key":"60_CR4","doi-asserted-by":"publisher","first-page":"1295","DOI":"10.1109\/TCAD.2015.2427259","volume":"34","author":"GT Becker","year":"2015","unstructured":"Becker, G.T.: On the pitfalls of using arbiter-PUFs as building blocks. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 34, 1295\u20131307 (2015b). https:\/\/doi.org\/10.1109\/TCAD.2015.2427259","journal-title":"IEEE Trans. Comput. Aided Des. Integr. Circuits Syst."},{"key":"60_CR5","volume-title":"Pattern recognition and machine learning","author":"CM Bishop","year":"2006","unstructured":"Bishop, C.M.: Pattern recognition and machine learning. Springer, New York (2006)"},{"key":"60_CR6","doi-asserted-by":"crossref","unstructured":"Che, W., Saqib, F., Plusquellic, J.: PUF-based authentication. In: 2015 IEEE\/ACM international conference on computer-aided design (ICCAD). pp. 337\u2013344 (2015)","DOI":"10.1109\/ICCAD.2015.7372589"},{"key":"60_CR7","doi-asserted-by":"publisher","first-page":"1200","DOI":"10.1109\/TVLSI.2005.859470","volume":"13","author":"L Daihyun","year":"2005","unstructured":"Daihyun, L., Lee, J.W., Gassend, B., Suh, G.E., van Dijk, M., Devadas, S.: Extracting secret keys from integrated circuits. IEEE Trans. Very Large Scale Integr. VLSI Syst. 13, 1200\u20131205 (2005). https:\/\/doi.org\/10.1109\/TVLSI.2005.859470","journal-title":"IEEE Trans. Very Large Scale Integr. VLSI Syst."},{"key":"60_CR8","doi-asserted-by":"publisher","first-page":"2043","DOI":"10.1109\/TIFS.2019.2891223","volume":"14","author":"J Delvaux","year":"2019","unstructured":"Delvaux, J.: Machine-learning attacks on PolyPUFs, OB-PUFs, RPUFs, LHS-PUFs, and PUF\u2013FSMs. IEEE Trans. Inf. Forensics Secur. 14, 2043\u20132058 (2019). https:\/\/doi.org\/10.1109\/TIFS.2019.2891223","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"60_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2818186","volume":"48","author":"J Delvaux","year":"2015","unstructured":"Delvaux, J., Peeters, R., Gu, D., Verbauwhede, I.: A survey on lightweight entity authentication with strong PUFs. ACM Comput. Surv. 48, 1\u201342 (2015). https:\/\/doi.org\/10.1145\/2818186","journal-title":"ACM Comput. Surv."},{"key":"60_CR10","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2020.2977069","author":"D Deng","year":"2020","unstructured":"Deng, D., Wang, Y., Guo, Y.: Novel design strategy towards A2 trojan detection based on built-in acceleration structure. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. (2020). https:\/\/doi.org\/10.1109\/TCAD.2020.2977069","journal-title":"IEEE Trans. Comput. Aided Des. Integr. Circuits Syst."},{"key":"60_CR11","doi-asserted-by":"crossref","unstructured":"Dubrova, E., Naslund, O., Degen, B., Gawell, A., Yu, Y.: CRC-PUF: a machine learning attack resistant lightweight PUF construction. In: 2019 IEEE European symposium on security and privacy workshops (EuroS&PW). pp. 264\u2013271. IEEE, Stockholm (2019)","DOI":"10.1109\/EuroSPW.2019.00036"},{"key":"60_CR12","doi-asserted-by":"crossref","unstructured":"Fruhashi, K., Shiozaki, M., Fukushima, A., Murayama, T., Fujino, T.: The arbiter-PUF with high uniqueness utilizing novel arbiter circuit with delay-time measurement. In: 2011 IEEE international symposium of circuits and systems (ISCAS). pp. 2325\u20132328. IEEE, Rio de Janeiro (2011)","DOI":"10.1109\/ISCAS.2011.5938068"},{"key":"60_CR13","unstructured":"Ganguli, S., Friedman, T.: IoT Technology Disruptions : A Gartner Trend Insight Report What You Need to Know. Technical Report June, Gartner Research (2017)"},{"key":"60_CR14","doi-asserted-by":"publisher","first-page":"1077","DOI":"10.1002\/cpe.805","volume":"16","author":"B Gassend","year":"2004","unstructured":"Gassend, B., Lim, D., Clarke, D., van Dijk, M., Devadas, S.: Identification and authentication of integrated circuits. Concurr. Comput. Pract. Exp. 16, 1077\u20131098 (2004). https:\/\/doi.org\/10.1002\/cpe.805","journal-title":"Concurr. Comput. Pract. Exp."},{"key":"60_CR15","volume-title":"Deep learning","author":"I Goodfellow","year":"2016","unstructured":"Goodfellow, I., Bengio, Y., Courville, A.: Deep learning. The MIT Press, Cambridge (2016)"},{"key":"60_CR16","doi-asserted-by":"crossref","unstructured":"Gu, C., Cui, Y., Hanley, N., O\u2019Neill, M.: Novel lightweight FF-APUF design for FPGA. In: 2016 29th IEEE international system-on-chip conference (SOCC). pp. 75\u201380. IEEE, Seattle (2016)","DOI":"10.1109\/SOCC.2016.7905439"},{"key":"60_CR17","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/978-3-540-74735-2_5","volume-title":"Cryptographic hardware and embedded systems\u2014CHES 2007","author":"J Guajardo","year":"2007","unstructured":"Guajardo, J., Kumar, S.S., Schrijen, G.-J., Tuyls, P.: FPGA intrinsic PUFs and their use for IP protection. In: Paillier, P., Verbauwhede, I. (eds.) Cryptographic hardware and embedded systems\u2014CHES 2007, pp. 63\u201380. Springer, Berlin (2007)"},{"key":"60_CR18","unstructured":"Hansen, N.: The CMA evolution strategy: a tutorial. ArXiv160400772 Cs Stat. (2016)"},{"key":"60_CR19","doi-asserted-by":"publisher","first-page":"1073","DOI":"10.1109\/TVLSI.2018.2806041","volume":"26","author":"Z He","year":"2018","unstructured":"He, Z., Wan, M., Deng, J., Bai, C., Dai, K.: A reliable strong PUF based on switched-capacitor circuit. IEEE Trans. Very Large Scale Integr. VLSI Syst. 26, 1073\u20131083 (2018). https:\/\/doi.org\/10.1109\/TVLSI.2018.2806041","journal-title":"IEEE Trans. Very Large Scale Integr. VLSI Syst."},{"key":"60_CR20","doi-asserted-by":"publisher","first-page":"344","DOI":"10.2197\/ipsjjip.22.344","volume":"22","author":"Y Hori","year":"2014","unstructured":"Hori, Y., Kang, H., Katashita, T., Satoh, A., Kawamura, S., Kobara, K.: Evaluation of physical unclonable functions for 28-nm process field-programmable gate arrays. J. Inf. Process. 22, 344\u2013356 (2014). https:\/\/doi.org\/10.2197\/ipsjjip.22.344","journal-title":"J. Inf. Process."},{"key":"60_CR21","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1016\/0893-6080(91)90009-T","volume":"4","author":"K Hornik","year":"1991","unstructured":"Hornik, K.: Approximation capabilities of multilayer feedforward networks. Neural Netw. 4, 251\u2013257 (1991). https:\/\/doi.org\/10.1016\/0893-6080(91)90009-T","journal-title":"Neural Netw."},{"key":"60_CR22","unstructured":"Huang, L., Wang, Z., Shen, L., Lu, H., Xiao, N., Liu, C.: A specialized low-cost vectorized loop buffer for embedded processors. In: 2011 Design, Automation Test in Europe. pp. 1\u20134 (2011)"},{"key":"60_CR23","doi-asserted-by":"crossref","unstructured":"Ikezaki, Y., Nozaki, Y., Yoshikawa, M.: Deep learning attack for physical unclonable function. In: 2016 IEEE 5th Global Conference on Consumer Electronics. pp. 1\u20132 (2016)","DOI":"10.1109\/GCCE.2016.7800478"},{"key":"60_CR24","doi-asserted-by":"crossref","unstructured":"Kant, S., Kumar, N., Gupta, S., Singhal, A., Dhasmana, R.: Impact of machine learning algorithms on analysis of stream ciphers. In: 2009 Proceeding of international conference on methods and models in computer science (ICM2CS). pp. 251\u2013258 (2009)","DOI":"10.1109\/ICM2CS.2009.5397953"},{"key":"60_CR25","doi-asserted-by":"crossref","unstructured":"Khalafalla, M., Gebotys, C.: PUFs Deep Attacks: Enhanced modeling attacks using deep learning techniques to break the security of double arbiter PUFs. In: 2019 design, automation & test in Europe conference & exhibition (DATE). pp. 204\u2013209. IEEE, Florence (2019)","DOI":"10.23919\/DATE.2019.8714862"},{"key":"60_CR26","unstructured":"Kingma, D.P., Ba, J.: Adam: A Method for Stochastic Optimization. ArXiv14126980 Cs. (2017)"},{"key":"60_CR27","doi-asserted-by":"crossref","unstructured":"Kumar, R., Burleson, W.: On design of a highly secure PUF based on non-linear current mirrors. In: 2014 IEEE international symposium on hardware-oriented security and trust (HOST). pp. 38\u201343. IEEE, Arlington (2014)","DOI":"10.1109\/HST.2014.6855565"},{"key":"60_CR28","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1090\/S0025-5718-99-00996-5","volume":"68","author":"P L\u2019Ecuyer","year":"1999","unstructured":"L\u2019Ecuyer, P.: Tables of linear congruential generators of different sizes and good lattice structure. Math. Comput. 68, 249\u2013261 (1999). https:\/\/doi.org\/10.1090\/S0025-5718-99-00996-5","journal-title":"Math. Comput."},{"key":"60_CR29","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1109\/TCAD.2016.2569581","volume":"36","author":"Y Lao","year":"2017","unstructured":"Lao, Y., Yuan, B., Kim, C.H., Parhi, K.K.: Reliable PUF-based local authentication with self-correction. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 36, 201\u2013213 (2017). https:\/\/doi.org\/10.1109\/TCAD.2016.2569581","journal-title":"IEEE Trans. Comput. Aided Des. Integr. Circuits Syst."},{"key":"60_CR30","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1038\/nature14539","volume":"521","author":"Y LeCun","year":"2015","unstructured":"LeCun, Y., Bengio, Y., Hinton, G.: Deep learning. Nature 521, 436\u2013444 (2015). https:\/\/doi.org\/10.1038\/nature14539","journal-title":"Nature"},{"key":"60_CR31","unstructured":"Lee, J.W., Daihyun L., Gassend, B., Suh, G.E., van Dijk, M., Devadas, S.: A technique to build a secret key in integrated circuits for identification and authentication applications. In: 2004 symposium on VLSI circuits. Digest of technical papers (IEEE Cat. No. 04CH37525). pp. 176\u2013179. Widerkehr and Associates, Honolulu (2004)"},{"key":"60_CR32","unstructured":"Lim, D.: Extracting secret keys from integrated circuits, https:\/\/dspace.mit.edu\/handle\/1721.1\/18059 (2004)"},{"key":"60_CR33","doi-asserted-by":"publisher","first-page":"575","DOI":"10.26599\/TST.2018.9010131","volume":"24","author":"J Liu","year":"2019","unstructured":"Liu, J., Yu, Y., Jia, J., Wang, S., Fan, P., Wang, H., Zhang, H.: Lattice-based double-authentication-preventing ring signature for security and privacy in vehicular Ad-Hoc networks. Tsinghua Sci. Technol. 24, 575\u2013584 (2019). https:\/\/doi.org\/10.26599\/TST.2018.9010131","journal-title":"Tsinghua Sci. Technol."},{"key":"60_CR34","doi-asserted-by":"crossref","unstructured":"Machida, T., Yamamoto, D., Iwamoto, M., Sakiyama, K.: A New Mode of Operation for Arbiter PUF to Improve Uniqueness on FPGA. Presented at the 2014 federated conference on computer science and information systems, September 29 (2014)","DOI":"10.15439\/2014F140"},{"key":"60_CR35","unstructured":"Maes, R., Tuyls, P., Verbauwhede, I.: Intrinsic PUFs from Flip-flops on Reconfigurable Devices. In: 3rd Benelux Workshop on Information and System Security (WIS-Sec2008) (2008)"},{"key":"60_CR36","first-page":"632","volume":"2013","author":"A Mahmoud","year":"2013","unstructured":"Mahmoud, A., R\u00fchrmair, U., Majzoobi, M., Koushanfar, F.: Combined modeling and side channel attacks on strong PUFs. IACR Cryptol. EPrint Arch. 2013, 632 (2013)","journal-title":"IACR Cryptol. EPrint Arch."},{"key":"60_CR37","doi-asserted-by":"crossref","unstructured":"Majzoobi, M., Koushanfar, F., Potkonjak, M.: Lightweight secure PUFs. In: 2008 IEEE\/ACM international conference on computer-aided design. pp. 670\u2013673 (2008)","DOI":"10.1109\/ICCAD.2008.4681648"},{"key":"60_CR38","doi-asserted-by":"crossref","unstructured":"Majzoobi, M., Koushanfar, F., Devadas, S.: FPGA PUF using programmable delay lines. In: 2010 IEEE international workshop on information forensics and security. pp. 1\u20136. IEEE, Seattle (2010)","DOI":"10.1109\/WIFS.2010.5711471"},{"key":"60_CR39","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1109\/TIT.1969.1054260","volume":"15","author":"J Massey","year":"1969","unstructured":"Massey, J.: Shift-register synthesis and BCH decoding. IEEE Trans. Inf. Theory. 15, 122\u2013127 (1969). https:\/\/doi.org\/10.1109\/TIT.1969.1054260","journal-title":"IEEE Trans. Inf. Theory."},{"key":"60_CR40","doi-asserted-by":"publisher","unstructured":"Nguyen, P.H., Sahoo, D.P., Jin, C., Mahmood, K., R\u00fchrmair, U., Dijk, M. van: The Interpose PUF: Secure PUF Design against State-of-the-art Machine Learning Attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 243\u2013290 (2019). https:\/\/doi.org\/10.13154\/tches.v2019.i4.243-290","DOI":"10.13154\/tches.v2019.i4.243-290"},{"key":"60_CR41","doi-asserted-by":"publisher","first-page":"2026","DOI":"10.1126\/science.1074376","volume":"297","author":"R Pappu","year":"2002","unstructured":"Pappu, R.: Physical one-way functions. Science 297, 2026\u20132030 (2002). https:\/\/doi.org\/10.1126\/science.1074376","journal-title":"Science"},{"key":"60_CR42","doi-asserted-by":"crossref","unstructured":"R\u00fchrmair, U., Sehnke, F., S \u00f6lter, J., Dror, G., Devadas, S., Schmidhuber, J. \u00fcrgen: Modeling attacks on physical unclonable functions. In: Proceedings of the 17th ACM conference on Computer and communications security\u2014CCS \u201910. p. 237. ACM Press, Chicago (2010)","DOI":"10.1145\/1866307.1866335"},{"key":"60_CR43","doi-asserted-by":"publisher","first-page":"1876","DOI":"10.1109\/TIFS.2013.2279798","volume":"8","author":"U Ruhrmair","year":"2013","unstructured":"Ruhrmair, U., Solter, J., Sehnke, F., Xu, X., Mahmoud, A., Stoyanova, V., Dror, G., Schmidhuber, J., Burleson, W., Devadas, S.: PUF modeling attacks on simulated and silicon data. IEEE Trans. Inf. Forensics Secur. 8, 1876\u20131891 (2013). https:\/\/doi.org\/10.1109\/TIFS.2013.2279798","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"60_CR44","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1109\/TC.2017.2749226","volume":"67","author":"DP Sahoo","year":"2018","unstructured":"Sahoo, D.P., Mukhopadhyay, D., Chakraborty, R.S., Nguyen, P.H.: A multiplexer-based arbiter PUF composition with enhanced reliability and security. IEEE Trans. Comput. 67, 403\u2013417 (2018). https:\/\/doi.org\/10.1109\/TC.2017.2749226","journal-title":"IEEE Trans. Comput."},{"key":"60_CR45","unstructured":"Santikellur, P., Bhattacharyay, A., Chakraborty, R.: Deep learning based model building attacks on arbiter PUF compositions. IACR Cryptol EPrint Arch. (2019)"},{"key":"60_CR46","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2019.2962115","author":"J Shi","year":"2019","unstructured":"Shi, J., Lu, Y., Zhang, J.: Approximation attacks on strong PUFs. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. (2019). https:\/\/doi.org\/10.1109\/TCAD.2019.2962115","journal-title":"IEEE Trans. Comput. Aided Des. Integr. Circuits Syst."},{"key":"60_CR47","doi-asserted-by":"crossref","unstructured":"Suh, G.E., Devadas, S.: Physical unclonable functions for device authentication and secret key generation. In: 2007 44th ACM\/IEEE Design Automation Conference. pp. 9\u201314 (2007)","DOI":"10.1109\/DAC.2007.375043"},{"key":"60_CR48","unstructured":"Tian, Y., Chen, G., Li, J.: On the Design of Trivium. IACR Cryptol. EPrint Arch. 2009, 431 (2009)"},{"key":"60_CR49","doi-asserted-by":"crossref","unstructured":"Tobisch, J., Becker, G.: On the scaling of machine learning attacks on PUFs with application to noise bifurcation. Presented at the June 23 (2015)","DOI":"10.1007\/978-3-319-24837-0_2"},{"key":"60_CR50","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/978-3-319-44524-3_16","volume-title":"Advances in information and computer security","author":"R Yashiro","year":"2016","unstructured":"Yashiro, R., Machida, T., Iwamoto, M., Sakiyama, K.: Deep-learning-based security evaluation on authentication systems using arbiter PUF and its variants. In: Ogawa, K., Yoshioka, K. (eds.) Advances in information and computer security, pp. 267\u2013285. Springer International Publishing, Cham (2016)"},{"key":"60_CR51","doi-asserted-by":"crossref","unstructured":"Ye, J., Hu, Y., Li, X.: OPUF: Obfuscation logic based physical unclonable function. In: 2015 IEEE 21st international on-line testing symposium (IOLTS). pp. 156\u2013161. IEEE, Halkidiki (2015)","DOI":"10.1109\/IOLTS.2015.7229850"},{"key":"60_CR52","doi-asserted-by":"crossref","unstructured":"Ye, J., Hu, Y., Li, X.: RPUF: Physical unclonable function with randomized challenge to resist modeling attack. In: 2016 IEEE Asian hardware-oriented security and trust (AsianHOST). pp. 1\u20136 (2016)","DOI":"10.1109\/AsianHOST.2016.7835567"},{"key":"60_CR53","doi-asserted-by":"crossref","unstructured":"Zalivaka, S.S., Puchkov, A.V., Klybik, V.P., Ivaniuk, A.A., Chang, C.-H.: Multi-valued arbiters for quality enhancement of PUF responses on FPGA implementation. In: 2016 21st Asia and South Pacific design automation conference (ASP-DAC). pp. 533\u2013538. IEEE, Macao (2016)","DOI":"10.1109\/ASPDAC.2016.7428066"}],"container-title":["CCF Transactions on High Performance Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42514-020-00060-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42514-020-00060-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42514-020-00060-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,16]],"date-time":"2021-04-16T07:50:42Z","timestamp":1618559442000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42514-020-00060-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,10]]},"references-count":53,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,3]]}},"alternative-id":["60"],"URL":"https:\/\/doi.org\/10.1007\/s42514-020-00060-7","relation":{},"ISSN":["2524-4922","2524-4930"],"issn-type":[{"value":"2524-4922","type":"print"},{"value":"2524-4930","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,12,10]]},"assertion":[{"value":"14 June 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 November 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 December 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"On behalf of all authors, the corresponding author states that there is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}