{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T06:28:33Z","timestamp":1770272913305,"version":"3.49.0"},"reference-count":59,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2024,2,27]],"date-time":"2024-02-27T00:00:00Z","timestamp":1708992000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,2,27]],"date-time":"2024-02-27T00:00:00Z","timestamp":1708992000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-024-02660-4","type":"journal-article","created":{"date-parts":[[2024,2,27]],"date-time":"2024-02-27T16:08:53Z","timestamp":1709050133000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["A Lightweight Authentication Protocol for a Blockchain-Based Off-Chain Medical Data Access in Multi-server Environment"],"prefix":"10.1007","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3206-1110","authenticated-orcid":false,"given":"Subhas","family":"Barman","sequence":"first","affiliation":[]},{"given":"Samiran","family":"Chattopadhyay","sequence":"additional","affiliation":[]},{"given":"Debasis","family":"Samanta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,27]]},"reference":[{"key":"2660_CR1","unstructured":"Sumant Ugalmugle, Rupali Swain, Electronic Health Record (EHR) Market, Competitive Market Share & Forecast, 2021 - 2027. https:\/\/www.gminsights.com\/industry-analysis\/electronic-health-record-market. Accessed on 5-12-22"},{"key":"2660_CR2","unstructured":"Electronic Health Records Market Size, Share & Trends Analysis Report By Type, By End-use, By Product, By Business Models, And Segment Forecasts, 2021 - 2028. https:\/\/www.grandviewresearch.com\/industry-analysis\/electronic-health-records-ehr-market."},{"key":"2660_CR3","unstructured":"Medical AI Database Containing More Than 800 Million Records Exposed Online,HIPPA Journal, October 28, 2021. Access on 29th2ctober, 2021. https:\/\/www.hipaajournal.com\/medical-ai-database-containing-more-than-800-million-records-exposed-online\/"},{"key":"2660_CR4","unstructured":"Blockchain Technology in Healthcare Market. Available at: https:\/\/www.marketsandmarkets.com\/Market-Reports\/blockchain-technology-healthcare-market-109977720.html, Accessed on: 15-Oct-21."},{"issue":"4","key":"2660_CR5","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.231","volume":"5","author":"S Barman","year":"2022","unstructured":"Barman S, Chattopadhyay S, Samanta D, Barman S. A blockchain-based approach to secure electronic health records using fuzzy commitment scheme. Secur Privacy. 2022;5(4): e231.","journal-title":"Secur Privacy."},{"issue":"1","key":"2660_CR6","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/s11277-014-2002-x","volume":"80","author":"X Li","year":"2015","unstructured":"Li X, Niu J, Kumari S, Liao J, Liang W. An enhancement of a smart card authentication scheme for multi-server architecture. Wirel Pers Commun. 2015;80(1):175\u201392.","journal-title":"Wirel. Pers. Commun."},{"issue":"3","key":"2660_CR7","doi-asserted-by":"publisher","first-page":"816","DOI":"10.1109\/JSYST.2014.2301517","volume":"9","author":"D He","year":"2015","unstructured":"He D, Wang D. Robust biometrics-based authentication scheme for multi-server environment. IEEE Syst J. 2015;9(3):816\u201323.","journal-title":"IEEE Syst. J."},{"key":"2660_CR8","doi-asserted-by":"publisher","first-page":"147782","DOI":"10.1109\/ACCESS.2019.2946373","volume":"7","author":"A Shahnaz","year":"2019","unstructured":"Shahnaz A, Qamar U, Khalid A. Using blockchain for electronic health records. IEEE Access. 2019;7:147782\u201395.","journal-title":"IEEE Access"},{"issue":"4","key":"2660_CR9","doi-asserted-by":"publisher","first-page":"1747","DOI":"10.1007\/s11277-014-2111-6","volume":"80","author":"F Wen","year":"2015","unstructured":"Wen F, Susilo W, Yang G. Analysis and improvement on a biometric-based remote user authentication scheme using smart-cards. Wirel Pers Commun. 2015;80(4):1747\u201360.","journal-title":"Wirel. Pers. Commun."},{"key":"2660_CR10","doi-asserted-by":"publisher","first-page":"3655","DOI":"10.1007\/s13369-017-2665-1","volume":"42","author":"Rifaqat Ali","year":"2017","unstructured":"Ali Rifaqat, Pal Arup. Three-factor-based confidentiality-preserving remote user authentication scheme in multi-server environment. Arab J Sci Eng. 2017;42:3655\u201372. https:\/\/doi.org\/10.1007\/s13369-017-2665-1.","journal-title":"Arab J Sci Eng."},{"issue":"4","key":"2660_CR11","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3484","volume":"31","author":"R Ali","year":"2018","unstructured":"Ali R, Pal AK. An efficient three factor-based authentication scheme in multiserver environment using ECC. Int J Commun Syst. 2018;31(4): e3484.","journal-title":"Int J Commun Syst."},{"key":"2660_CR12","doi-asserted-by":"publisher","unstructured":"Irshad, A.; Sher, M.;Nawaz, O.; Chaudhry, S. A.;Khan, I.;Kumari, S.: A secure and provable multi-server authenticated key agreement for tmis based on Amin et al. scheme. Multimed. Tools Appl.(2016). https:\/\/doi.org\/10.1007\/s11042-016-3921-1.","DOI":"10.1007\/s11042-016-3921-1"},{"issue":"2","key":"2660_CR13","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev D, Yao AC. On the security of public key protocols. IEEE Trans Inf Theory. 1983;29(2):198\u2013208.","journal-title":"IEEE Trans Inf Theory."},{"key":"2660_CR14","doi-asserted-by":"crossref","unstructured":"R. Canetti and H. Krawczyk, \u201cAnalysis of key-exchange protocols and their use for building secure channels,\u201d in International Conference on the Theory and Applications of Cryptographic Techniques- Advances in Cryptology (EUROCRYPT 2001). Innsbruck (Tyrol), Austria: Springer, 2001, pp. 453-474.","DOI":"10.1007\/3-540-44987-6_28"},{"issue":"1","key":"2660_CR15","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1007\/s11277-014-1762-7","volume":"78","author":"D Guo","year":"2014","unstructured":"Guo D, Wen F. Analysis and improvement of a robust smart card based-authentication scheme for multi-server architecture. Wirel Pers Commun. 2014;78(1):475\u201390.","journal-title":"Wirel. Pers. Commun."},{"issue":"1","key":"2660_CR16","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M Burrows","year":"1990","unstructured":"Burrows M, Abadi M, Needham R. A logic of authentication. ACM Trans Comput Syst. 1990;8(1):18\u201336.","journal-title":"ACM Trans Comput Syst."},{"key":"2660_CR17","doi-asserted-by":"crossref","unstructured":"Kocher P, Jaffe J, Jun B. Differential power analysis. In: Advances in Cryptology- CRYPTO99. Springer; 1999. p. 388-397.","DOI":"10.1007\/3-540-48405-1_25"},{"issue":"5","key":"2660_CR18","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"TS Messerges","year":"2002","unstructured":"Messerges TS, Dabbish EA, Sloan RH. Examining smart-card security under the threat of power analysis attacks. IEEE Trans Comput. 2002;51(5):541\u201352.","journal-title":"IEEE Trans. Comput."},{"key":"2660_CR19","unstructured":"Saho, Nelson Josias Gb\u00e8toho, and Eug\u00e8ne C. Ezin. \"Comparative Study on the Performance of Elliptic Curve Cryptography Algorithms with Cryptography through RSA Algorithm.\" CARI 2020-Colloque Africain sur la Recherche en Informatique et en Math\u00e9matiques Apliqu\u00e9es. 2020."},{"key":"2660_CR20","doi-asserted-by":"publisher","first-page":"38578","DOI":"10.1109\/ACCESS.2018.2854798","volume":"6","author":"S Barman","year":"2018","unstructured":"Barman S, Das AK, Samanta D, Chattopadhyay S, Rodrigues JJPC, Park Y. Provably secure multi-server authentication protocol using fuzzy commitment. IEEE Access. 2018;6:38578\u201394. https:\/\/doi.org\/10.1109\/ACCESS.2018.2854798.","journal-title":"IEEE Access."},{"key":"2660_CR21","doi-asserted-by":"publisher","first-page":"12557","DOI":"10.1109\/ACCESS.2019.2893185","volume":"7","author":"S Barman","year":"2019","unstructured":"Barman S, Shum HPH, Chattopadhyay S, Samanta D. A secure authentication protocol for multi-server-based E-healthcare using a fuzzy commitment scheme. IEEE Access. 2019;7:12557\u201374. https:\/\/doi.org\/10.1109\/ACCESS.2019.2893185.","journal-title":"IEEE Access"},{"issue":"12","key":"2660_CR22","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0243043","volume":"15","author":"S Chenthara","year":"2020","unstructured":"Chenthara S, Ahmed K, Wang H, Whittaker F, Chen Z. Healthchain: a novel framework on privacy preservation of electronic health records using blockchain technology. PLoS ONE. 2020;15(12): e0243043. https:\/\/doi.org\/10.1371\/journal.pone.0243043.","journal-title":"PLoS ONE."},{"key":"2660_CR23","doi-asserted-by":"crossref","unstructured":"Azaria A, Ekblaw A, Vieira T, Lippman A. Medrec: Using blockchain for medical data access and permission management. In: 2016 2nd International Conference on Open and Big Data (OBD). IEEE;2016. p. 25-30.","DOI":"10.1109\/OBD.2016.11"},{"issue":"6","key":"2660_CR24","doi-asserted-by":"publisher","first-page":"1207","DOI":"10.3390\/app9061207","volume":"9","author":"B Shen","year":"2019","unstructured":"Shen B, Guo J, Yang Y. MedChain: efficient healthcare data sharing via blockchain. Appl Sci. 2019;9(6):1207. https:\/\/doi.org\/10.3390\/app9061207.","journal-title":"Appl. Sci."},{"key":"2660_CR25","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1016\/j.scs.2018.02.014","volume":"39","author":"GG Dagher","year":"2018","unstructured":"Dagher GG, Mohler J, Milojkovic M, Marella PB. Ancile: Privacy-preserving framework for access control and interoperability of electronic health records using blockchain technology. Sustain Cities Soc. 2018;39:283\u201397. https:\/\/doi.org\/10.1016\/j.scs.2018.02.014.","journal-title":"Sustain. Cities Soc."},{"issue":"2","key":"2660_CR26","doi-asserted-by":"publisher","first-page":"326","DOI":"10.3390\/s19020326","volume":"19","author":"AD Dwivedi","year":"2019","unstructured":"Dwivedi AD, Srivastava G, Dhar S, Singh R. A decentralized privacy-preserving healthcare blockchain for IoT. Sensors. 2019;19(2):326. https:\/\/doi.org\/10.3390\/s19020326. (PMID: 30650612).","journal-title":"Sensors."},{"issue":"8","key":"2660_CR27","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1007\/s10916-018-0994-6","volume":"42","author":"H Wang","year":"2018","unstructured":"Wang H, Song Y. Secure cloud-based EHR system using attribute-based cryptosystem and blockchain. J Med Syst. 2018;42(8):152. https:\/\/doi.org\/10.1007\/s10916-018-0994-6. (PMID:29974270).","journal-title":"J Med Syst."},{"key":"2660_CR28","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1016\/j.csbj.2018.07.004","volume":"16","author":"P Zhang","year":"2018","unstructured":"Zhang P, White J, Schmidt DC, Lenz G, Rosenbloom ST. Fhirchain: applying blockchain to securely and scalably share clinical data. Comput Struct Biotechnol J. 2018;16:267\u201378. https:\/\/doi.org\/10.1016\/j.csbj.2018.07.004. (PMID: 30108685).","journal-title":"Comput Struct Biotechnol J."},{"key":"2660_CR29","unstructured":"Medicalchain Whitepaper 2.1. Available at: https:\/\/medicalchain.com\/Medicalchain-Whitepaper-EN.pdf. Accessed Oct 19 2021."},{"key":"2660_CR30","unstructured":"Iryo Network Technical Whitepaper. Available at: https:\/\/iryo.network\/iryo_whitepaper.pdf. Accessed Oct 19 2021."},{"key":"2660_CR31","doi-asserted-by":"crossref","unstructured":"Jiang S, Cao J, Wu H, Yang Y, Ma M, He J. Blochie: a blockchain-based platform for healthcare information exchange. In: ieee international conference on smart computing (smartcomp). IEEE. 2018;2018:49\u201356.","DOI":"10.1109\/SMARTCOMP.2018.00073"},{"key":"2660_CR32","doi-asserted-by":"crossref","unstructured":"Li, P., Nelson, S. D., Malin, B. A., & Chen, Y. (2019). DMMS: A Decentralized Blockchain Ledger for the Management of Medication Histories. Blockchain in healthcare today, 2, 38. https:\/\/doi.org\/10.30953\/bhty.v2.38","DOI":"10.30953\/bhty.v1.38"},{"issue":"1","key":"2660_CR33","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/j.hlpt.2020.01.004","volume":"9","author":"P Pandey","year":"2020","unstructured":"Pandey P, Litoriya R. Implementing healthcare services on a large scale: Challenges and remedies based on blockchain technology. Health Policy Technol. 2020;9(1):69\u201378.","journal-title":"Health Policy Technol."},{"key":"2660_CR34","doi-asserted-by":"crossref","unstructured":"Juels, A. and Wattenberg, M. \"A fuzzy commitment scheme,\" in Proc.ACM Conf. Computer and Communications Security (CCS), 1999, pp.28-36.","DOI":"10.1145\/319709.319714"},{"key":"2660_CR35","volume-title":"The Theory of Error-Correcting Codes, Amsterdam","author":"FJ MacWilliams","year":"1991","unstructured":"MacWilliams FJ, Sloane NJA. The Theory of Error-Correcting Codes, Amsterdam. The Netherlands: North Holland; 1991."},{"key":"2660_CR36","doi-asserted-by":"publisher","first-page":"108586","DOI":"10.1109\/ACCESS.2021.3101111","volume":"9","author":"Vishesh P Gaikwad","year":"2021","unstructured":"Gaikwad Vishesh P, Tembhurne Jitendra V, Meshram Chandrashekhar, Lee Cheng-Chi, Li Chun-Ta. An efficient provably secure verifier-based three-factor authentication technique using PDL for data exchange in TMIS. Access IEEE. 2021;9:108586\u2013600.","journal-title":"Access IEEE"},{"key":"2660_CR37","doi-asserted-by":"crossref","unstructured":"Androulaki E, Barger A, Bortnikov V, Cachin C, Christidis K, De Caro A, et al. Hyperledger fabric: a distributed operating system for permissioned blockchains. In: Proceedings of the Thirteenth EuroSys Conference. ACM; 2018. p. 30.","DOI":"10.1145\/3190508.3190538"},{"key":"2660_CR38","doi-asserted-by":"crossref","unstructured":"Dhillon V, Metcalf D, Hooper M. The hyperledger project. In: Blockchain enabled applications. Springer; 2017. p. 139-149.","DOI":"10.1007\/978-1-4842-3081-7_10"},{"key":"2660_CR39","unstructured":"AVISPA: Automated Validation of Internet Security Protocols and Applications, Jan. 2016, [online] http:\/\/www.avispa-project.org\/."},{"issue":"2","key":"2660_CR40","doi-asserted-by":"publisher","first-page":"2359","DOI":"10.1007\/s11042-017-4390-x","volume":"77","author":"S Kumari","year":"2018","unstructured":"Kumari S, Das AK, Li X, et al. A provably secure biometrics-based authenticated key agreement scheme for multi-server environments. Multimedia Tools Appl. 2018;77(2):2359\u201389.","journal-title":"Multimedia Tools Appl."},{"key":"2660_CR41","doi-asserted-by":"crossref","unstructured":"Hussain Khan, A., UL Hassan, N., Mujeeb Ahmed, C., Afzal Uzmi, Z., Yuen, C. (2023). Blockchain-Enabled Data Sharing in Connected Autonomous Vehicles for Heterogeneous Networks. In: Zhou, J., et al. Applied Cryptography and Network Security Workshops. ACNS 2023. Lecture Notes Comput Sci., vol 13907. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-031-41181-6_12","DOI":"10.1007\/978-3-031-41181-6_12"},{"key":"2660_CR42","doi-asserted-by":"crossref","unstructured":"Sharma P, Namasudra S, Lorenz P, 2023, May. Blockchain-Based Cloud Storage System with Enhanced Optimization and Integrity Preservation. In ICC 2023-IEEE International Conference on Communications (pp. 3744-3749). IEEE.","DOI":"10.1109\/ICC45041.2023.10279598"},{"key":"2660_CR43","doi-asserted-by":"crossref","unstructured":"Ploder, C., Spiess, T., Bernsteiner, R., Dilger, T. and Weichelt, R., 2021. A risk analysis on blockchain technology usage for electronic health records. Cloud Comput Data Sci., pp.20-35.","DOI":"10.37256\/ccds.222021777"},{"key":"2660_CR44","doi-asserted-by":"crossref","unstructured":"Thalhammer F, Sch\u00f6ttle P, Janetschek M, Ploder C. Blockchain Use Cases Against Climate Destruction. Cloud Comput Data Sci., 2022;pp.60-76.","DOI":"10.37256\/ccds.3220221277"},{"issue":"8","key":"2660_CR45","doi-asserted-by":"publisher","first-page":"446","DOI":"10.3390\/info14080446","volume":"14","author":"SA Sultana","year":"2023","unstructured":"Sultana SA, Rupa C, Malleswari RP, Gadekallu TR. IPFS-blockchain smart contracts based conceptual framework to reduce certificate frauds in the academic field. Information. 2023;14(8):446. https:\/\/doi.org\/10.3390\/info14080446.","journal-title":"Information."},{"issue":"19","key":"2660_CR46","doi-asserted-by":"publisher","first-page":"3070","DOI":"10.3390\/electronics11193070","volume":"11","author":"R Ch","year":"2022","unstructured":"Ch R, Srivastava G, Nagasree YLV, Ponugumati A, Ramachandran S. Robust cyber-physical system enabled smart healthcare unit using blockchain technology. Electronics. 2022;11(19):3070. https:\/\/doi.org\/10.3390\/electronics11193070.","journal-title":"Electronics."},{"issue":"15","key":"2660_CR47","doi-asserted-by":"publisher","first-page":"1853","DOI":"10.1049\/cmu2.12439","volume":"16","author":"C Rupa","year":"2022","unstructured":"Rupa C, MidhunChakkarvarthy D, Patan R, Prakash AB, Pradeep GG. Knowledge engineering-based DApp using blockchain technology for protract medical certificates privacy. IET Commun. 2022;16(15):1853\u201364.","journal-title":"IET Commun."},{"key":"2660_CR48","doi-asserted-by":"publisher","first-page":"107993","DOI":"10.1109\/ACCESS.2020.3000716","volume":"8","author":"Z Ali","year":"2020","unstructured":"Ali Z, et al. ITSSAKA-MS: an improved three-factor symmetric-key based secure AKA scheme for multi-server environments. IEEE Access. 2020;8:107993\u20138003. https:\/\/doi.org\/10.1109\/ACCESS.2020.3000716.","journal-title":"IEEE Access."},{"key":"2660_CR49","unstructured":"Shivom: a precision medicine data secure-sharing and analysis ecosystem. Research & Innovation News. https:\/\/www.healtheuropa.com\/shivom-precision-medicine\/90476\/"},{"key":"2660_CR50","unstructured":"Blockchain Powered Ecosystem forTotal Health, White Paper, NHCT, Available: https:\/\/cryptototem.com\/wp-ico\/img\/new%20projects\/NanoHealthCare%20Token\/NHCT_Whitepaper.pdf, Accessed Nov 20, 2023."},{"key":"2660_CR51","unstructured":"Value for Patients and Providers, EMRchain. https:\/\/www.emrchain.io\/home"},{"key":"2660_CR52","unstructured":"Healthdat Marketplace, https:\/\/patientory.com\/"},{"key":"2660_CR53","unstructured":"Enterprise Blockchain | Guardtime. https:\/\/guardtime.com\/. Accessed Nov 19, (023)."},{"key":"2660_CR54","unstructured":"Enterprise Blockchain | Guardtime. https:\/\/guardtime.com\/. Accessed Nov 19, (2023)."},{"key":"2660_CR55","unstructured":"BurstIQ, https:\/\/burstiq.com\/"},{"key":"2660_CR56","unstructured":"Akiri, Accessed on 20.11.23, https:\/\/builtin.com\/company\/akiri"},{"key":"2660_CR57","unstructured":"ProCredEx, https:\/\/procredex.com\/, Accessed on 20.11.23"},{"key":"2660_CR58","unstructured":"Avaneer Health, https:\/\/avaneerhealth.com\/, accessed on November 20, (2023)."},{"key":"2660_CR59","unstructured":"SimplyVital Health, www.simplyvitalhealth.com, accessed on November 20, (2023)."}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-024-02660-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-024-02660-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-024-02660-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,27]],"date-time":"2024-02-27T16:15:49Z","timestamp":1709050549000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-024-02660-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,27]]},"references-count":59,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2024,3]]}},"alternative-id":["2660"],"URL":"https:\/\/doi.org\/10.1007\/s42979-024-02660-4","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,2,27]]},"assertion":[{"value":"17 August 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 January 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 February 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics Approval"}},{"value":"The authors have no conflicts of interest to declare that are relevant to the Content of this Article.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}},{"value":"Not applicable","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to Publish"}}],"article-number":"292"}}