{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T19:52:44Z","timestamp":1757620364172,"version":"3.44.0"},"reference-count":54,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2025,7,29]],"date-time":"2025-07-29T00:00:00Z","timestamp":1753747200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,7,29]],"date-time":"2025-07-29T00:00:00Z","timestamp":1753747200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"name":"NSFC-FDCT under its Joint Scientific Research Project Fund, China & Macau S.A.R","award":["0051\/2022\/AFJ"],"award-info":[{"award-number":["0051\/2022\/AFJ"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J. King Saud Univ. Comput. Inf. Sci."],"published-print":{"date-parts":[[2025,8]]},"DOI":"10.1007\/s44443-025-00151-x","type":"journal-article","created":{"date-parts":[[2025,7,29]],"date-time":"2025-07-29T07:37:18Z","timestamp":1753774638000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A robust and efficient authentication and key agreement for UAV-assisted AGS communication in internet of vessels"],"prefix":"10.1007","volume":"37","author":[{"given":"Shang","family":"Gao","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1658-4931","authenticated-orcid":false,"given":"Zuobin","family":"Ying","sequence":"additional","affiliation":[]},{"given":"Zijie","family":"Pan","sequence":"additional","affiliation":[]},{"given":"Jianping","family":"Cai","sequence":"additional","affiliation":[]},{"given":"Maode","family":"Ma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,29]]},"reference":[{"issue":"1","key":"151_CR1","first-page":"73","volume":"2","author":"M Alotaibi","year":"2019","unstructured":"Alotaibi M, Al-hendi D, Alroithy B, AlGhamdi M, Gutub A (2019) Secure mobile computing authentication utilizing hash, cryptography and steganography combination. J Inf Secur Cybercrimes Res 2(1):73\u201382","journal-title":"J Inf Secur Cybercrimes Res"},{"issue":"4","key":"151_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJEHMC.2019100101","volume":"10","author":"N Alassaf","year":"2019","unstructured":"Alassaf N, Gutub A (2019) Simulating light-weight-cryptography implementation for iot healthcare data security applications. Int J E-Health Med Commun (IJEHMC) 10(4):1\u201315","journal-title":"Int J E-Health Med Commun (IJEHMC)"},{"key":"151_CR3","doi-asserted-by":"crossref","unstructured":"Ardianto B, Nurcahyo HSD, Mufti\u0107 H, Harwahyu R, Sari RF (2022) Performance comparison of aodv, aodv-etx and modified aodv-etx in vanet using ns3. In: 2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom), pp 156\u2013161. IEEE","DOI":"10.1109\/CyberneticsCom55287.2022.9865467"},{"key":"151_CR4","doi-asserted-by":"crossref","unstructured":"Akhtar MW, Saeed N (2022) Uavs-enabled maritime communications: opportunities and challenges. arXiv:2206.03118","DOI":"10.1109\/MSMC.2022.3231415"},{"issue":"4","key":"151_CR5","doi-asserted-by":"publisher","first-page":"3525","DOI":"10.1109\/JIOT.2022.3219674","volume":"10","author":"FS Alqurashi","year":"2022","unstructured":"Alqurashi FS, Trichili A, Saeed N, Ooi BS, Alouini M-S (2022) Maritime communications: A survey on enabling technologies, opportunities, and challenges. IEEE Internet of Things J 10(4):3525\u20133547","journal-title":"IEEE Internet of Things J"},{"key":"151_CR6","doi-asserted-by":"crossref","unstructured":"Badshah A, Abbas G, Waqas M, Tu S, Abbas ZH, Muhammad F, Chen S (2024) Usaf-iod: ultralightweight and secure authenticated key agreement framework for internet of drones environment. IEEE Trans Veh Technol","DOI":"10.1109\/TVT.2024.3375758"},{"issue":"2","key":"151_CR7","first-page":"2401","volume":"24","author":"SA Chaudhry","year":"2023","unstructured":"Chaudhry SA, Irshad A, Khan MA, Khan SA, Nosheen S, AlZubi AA, Zikria YB (2023) A lightweight authentication scheme for 6g-iot enabled maritime transport system. IEEE Trans Intell Transport Syst 24(2):2401\u20132410","journal-title":"IEEE Trans Intell Transport Syst"},{"key":"151_CR8","doi-asserted-by":"crossref","unstructured":"Choe H, Kang D (2025) Ecc based authentication protocol for military internet of drone (iod): A holistic security framework. IEEE Access","DOI":"10.1109\/ACCESS.2025.3536014"},{"issue":"1","key":"151_CR9","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1109\/TWC.2015.2473165","volume":"15","author":"C-C Chang","year":"2015","unstructured":"Chang C-C, Le H-D (2015) A provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks. IEEE Trans Wireless Commun 15(1):357\u2013366","journal-title":"IEEE Trans Wireless Commun"},{"key":"151_CR10","doi-asserted-by":"crossref","unstructured":"Chen C-M, Liu S, Li X, Islam SH, Das AK (2023) A provably-secure authenticated key agreement protocol for remote patient monitoring iomt. J Syst Architect 136:102831","DOI":"10.1016\/j.sysarc.2023.102831"},{"issue":"2","key":"151_CR11","doi-asserted-by":"publisher","first-page":"1454","DOI":"10.1109\/TNSE.2023.3323972","volume":"11","author":"J Cui","year":"2023","unstructured":"Cui J, Liu X, Zhong H, Zhang J, Wei L, Bolodurina I, He D (2023) A practical and provably secure authentication and key agreement scheme for uav-assisted vanets for emergency rescue. IEEE Trans Netw Sci Eng 11(2):1454\u20131468","journal-title":"IEEE Trans Netw Sci Eng"},{"key":"151_CR12","doi-asserted-by":"crossref","unstructured":"Dogan H (2023) Protecting uav-networks: A secure lightweight authentication and key agreement scheme. In: 2023 7th International Conference on Cryptography, Security and Privacy (CSP), pp 13\u201321. IEEE","DOI":"10.1109\/CSP58884.2023.00010"},{"issue":"2","key":"151_CR13","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev D, Yao A (1983) On the security of public key protocols. IEEE Trans Inf Theory 29(2):198\u2013208","journal-title":"IEEE Trans Inf Theory"},{"key":"151_CR14","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/j.comcom.2020.03.009","volume":"155","author":"YK Ever","year":"2020","unstructured":"Ever YK (2020) A secure authentication scheme framework for mobile-sinks used in the internet of drones applications. Comput Commun 155:143\u2013149","journal-title":"Comput Commun"},{"issue":"1","key":"151_CR15","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1109\/TWC.2022.3191719","volume":"22","author":"X Fang","year":"2022","unstructured":"Fang X, Feng W, Wang Y, Chen Y, Ge N, Ding Z, Zhu H (2022) Noma-based hybrid satellite-uav-terrestrial networks for 6g maritime coverage. IEEE Trans Wireless Commun 22(1):138\u2013152","journal-title":"IEEE Trans Wireless Commun"},{"key":"151_CR16","doi-asserted-by":"crossref","unstructured":"Feng X, Wang X, Cui K, Xie Q, Wang L (2023) A distributed message authentication scheme with reputation mechanism for internet of vehicles. J Syst Architect 145:103029","DOI":"10.1016\/j.sysarc.2023.103029"},{"issue":"1","key":"151_CR17","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/j.jer.2023.09.014","volume":"12","author":"A Gutub","year":"2024","unstructured":"Gutub A (2024) Adjusting counting-based secret-sharing via personalized passwords and email-authentic reliability. J Eng Res 12(1):107\u2013121","journal-title":"J Eng Res"},{"key":"151_CR18","doi-asserted-by":"crossref","unstructured":"Huang W (2024) Ecc-based three-factor authentication and key agreement scheme for wireless sensor networks. Sci Reports 14(1):1787","DOI":"10.1038\/s41598-024-52134-z"},{"issue":"1","key":"151_CR19","doi-asserted-by":"publisher","first-page":"20","DOI":"10.5937\/telfor1801020J","volume":"10","author":"NJ Jevtic","year":"2018","unstructured":"Jevtic NJ, Malnar MZ (2018) Implementation of etx metric within the aodv protocol in the ns-3 simulator. Telfor J 10(1):20\u201325","journal-title":"Telfor J"},{"key":"151_CR20","doi-asserted-by":"crossref","unstructured":"Khan MA, Alzahrani BA, Barnawi A, Al-Barakati A, Irshad A, Chaudhry SA (2022) A resource friendly authentication scheme for space-air-ground-sea integrated maritime communication network. Ocean Eng 250:110894","DOI":"10.1016\/j.oceaneng.2022.110894"},{"issue":"5","key":"151_CR21","doi-asserted-by":"publisher","first-page":"3416","DOI":"10.1109\/TII.2021.3101651","volume":"18","author":"MA Khan","year":"2021","unstructured":"Khan MA, Ullah I, Alkhalifah A, Rehman SU, Shah JA, Uddin MI, Alsharif MH, Algarni F (2021) A provable and privacy-preserving authentication scheme for uav-enabled intelligent transportation systems. IEEE Trans Indust Inf 18(5):3416\u20133425","journal-title":"IEEE Trans Indust Inf"},{"key":"151_CR22","doi-asserted-by":"crossref","unstructured":"Khan MA, Ullah I, Mouratidis H, Alqhatani A, Lorenz P (2025) A hyperelliptic curve-based authenticated key agreement scheme for unmanned aerial vehicles in cross-domain environments. Chinese J Aeronaut, 103495","DOI":"10.1016\/j.cja.2025.103495"},{"issue":"11","key":"151_CR23","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L Lamport","year":"1981","unstructured":"Lamport L (1981) Password authentication with insecure communication. Commun ACM 24(11):770\u2013772","journal-title":"Commun ACM"},{"issue":"4","key":"151_CR24","doi-asserted-by":"publisher","first-page":"5079","DOI":"10.1109\/TVT.2022.3224611","volume":"72","author":"K Lounis","year":"2022","unstructured":"Lounis K, Ding SH, Zulkernine M (2022) D2d-map: A drone to drone authentication protocol using physical unclonable functions. IEEE Trans Veh Technol 72(4):5079\u20135093","journal-title":"IEEE Trans Veh Technol"},{"issue":"6","key":"151_CR25","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1109\/MWC.001.2000076","volume":"27","author":"X Li","year":"2020","unstructured":"Li X, Feng W, Wang J, Chen Y, Ge N, Wang C-X (2020) Enabling 5g on the ocean: A hybrid satellite-uav-terrestrial network solution. IEEE Wireless Commun 27(6):116\u2013121","journal-title":"IEEE Wireless Commun"},{"key":"151_CR26","doi-asserted-by":"crossref","unstructured":"Li Y (2024) An improved lightweight and privacy preserving authentication scheme for smart grid communication. J Syst Architect 152:103176","DOI":"10.1016\/j.sysarc.2024.103176"},{"key":"151_CR27","doi-asserted-by":"crossref","unstructured":"LaMacchia B, Lauter K, Mityagin A (2007) Stronger security of authenticated key exchange. In: International Conference on Provable Security, pp 1\u201316. Springer","DOI":"10.1007\/978-3-540-75670-5_1"},{"key":"151_CR28","doi-asserted-by":"crossref","unstructured":"Li L, Li S, Peng H, Bi J (2022) An efficient secure data transmission and node authentication scheme for wireless sensing networks. J Syst Architect 133:102760","DOI":"10.1016\/j.sysarc.2022.102760"},{"issue":"8","key":"151_CR29","doi-asserted-by":"publisher","first-page":"3599","DOI":"10.1109\/TII.2017.2773666","volume":"14","author":"X Li","year":"2017","unstructured":"Li X, Niu J, Bhuiyan MZA, Wu F, Karuppiah M, Kumari S (2017) A robust ecc-based provable secure authentication protocol with privacy preserving for industrial internet of things. IEEE Trans Indust Inf 14(8):3599\u20133609","journal-title":"IEEE Trans Indust Inf"},{"issue":"1","key":"151_CR30","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1002\/spy2.338","volume":"7","author":"Y Mekdad","year":"2024","unstructured":"Mekdad Y, Aris A, Acar A, Conti M, Lazzeretti R, Fergougui AE, Uluagac S (2024) A comprehensive security and performance assessment of uav authentication schemes. Secur Privacy 7(1):338","journal-title":"Secur Privacy"},{"key":"151_CR31","doi-asserted-by":"crossref","unstructured":"Miao J, Wang Z, Ning X, Shankar A, Maple C, Rodrigues JJ (2024) A uav-assisted authentication protocol for internet of vehicles. IEEE Trans Intell Transport Syst","DOI":"10.1109\/TITS.2024.3360251"},{"key":"151_CR32","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/OJCOMS.2022.3225590","volume":"4","author":"N Nomikos","year":"2022","unstructured":"Nomikos N, Gkonis PK, Bithas PS, Trakadas P (2022) A survey on uav-aided maritime communications: Deployment considerations, applications, and future challenges. IEEE Open J Commun Soc 4:56\u201378","journal-title":"IEEE Open J Commun Soc"},{"issue":"1","key":"151_CR33","doi-asserted-by":"publisher","first-page":"1029","DOI":"10.32604\/cmc.2024.053854","volume":"81","author":"VO Nyangaresi","year":"2024","unstructured":"Nyangaresi VO, Ghaib AA, Jasim HM, Abduljabbar ZA, Ma J, Al Sibahee MA, Aldarwish AJ, Ali AH, Neamah HA (2024) Message verification protocol based on bilinear pairings and elliptic curves for enhanced security in vehicular ad hoc networks. Comput, Mater Continua 81(1):1029\u20131057","journal-title":"Comput, Mater Continua"},{"key":"151_CR34","doi-asserted-by":"crossref","unstructured":"Nyangaresi VO, Ogundoyin SO (2021) Certificate based authentication scheme for smart homes. In: 2021 3rd Global Power, Energy and Communication Conference (GPECOM), pp 202\u2013207. IEEE","DOI":"10.1109\/GPECOM52585.2021.9607322"},{"key":"151_CR35","doi-asserted-by":"crossref","unstructured":"Nyangaresi VO (2022) Lightweight anonymous authentication protocol for resource-constrained smart home devices based on elliptic curve cryptography. J Syst Architect 133:102763","DOI":"10.1016\/j.sysarc.2022.102763"},{"key":"151_CR36","doi-asserted-by":"crossref","unstructured":"Pan X, Jin Y, Li F (2023) An efficient heterogeneous authenticated key agreement scheme for unmanned aerial vehicles. J Syst Architect 136:102821","DOI":"10.1016\/j.sysarc.2022.102821"},{"key":"151_CR37","doi-asserted-by":"crossref","unstructured":"Pavur J, Moser D, Strohmeier M, Lenders V, Martinovic I (2020) A tale of sea and sky on the security of maritime vsat communications. In: 2020 IEEE Symposium on Security and Privacy (SP), pp 1384\u20131400. IEEE","DOI":"10.1109\/SP40000.2020.00056"},{"issue":"3","key":"151_CR38","doi-asserted-by":"publisher","first-page":"3880","DOI":"10.1109\/TNSM.2023.3246732","volume":"20","author":"X Ren","year":"2023","unstructured":"Ren X, Cao J, Ma R, Luo Y, Guan J, Zhang Y, Li H (2023) A novel access and handover authentication scheme in uav-aided satellite-terrestrial integration networks enabling 5g. IEEE Trans Netw Serv Manage 20(3):3880\u20133899","journal-title":"IEEE Trans Netw Serv Manage"},{"issue":"4","key":"151_CR39","doi-asserted-by":"publisher","first-page":"1194","DOI":"10.3390\/s25041194","volume":"25","author":"MA Sen","year":"2025","unstructured":"Sen MA, Al-Rubaye S, Tsourdos A (2025) Securing uav flying ad hoc wireless networks: Authentication development for robust communications. Sensors 25(4):1194","journal-title":"Sensors"},{"key":"151_CR40","unstructured":"Saarnisaari H, Dixit S, Alouini M-S, Chaoub A, Giordani M, Kliks A, Matinmikko-Blue M, Zhang N, Agrawal A, Andersson M, et al(2020) A 6g white paper on connectivity for remote areas. arXiv:2004.14699"},{"key":"151_CR41","doi-asserted-by":"crossref","unstructured":"Semenyuk V, Kurmashev I, Lupidi A, Alyoshin D, Kurmasheva L, Cantelli-Forti A (2025) Advances in uav detection: Integrating multi-sensor systems and ai for enhanced accuracy and efficiency. Int J Critic Infrastruct Protect, 100744","DOI":"10.1016\/j.ijcip.2025.100744"},{"issue":"3","key":"151_CR42","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1109\/MCOM.2018.1700666","volume":"56","author":"S Sekander","year":"2018","unstructured":"Sekander S, Tabassum H, Hossain E (2018) Multi-tier drone architecture for 5g\/b5g cellular networks: Challenges, trends, and prospects. IEEE Commun Magaz 56(3):96\u2013103","journal-title":"IEEE Commun Magaz"},{"issue":"4","key":"151_CR43","doi-asserted-by":"publisher","first-page":"230","DOI":"10.23919\/JCC.2021.04.017","volume":"18","author":"R Tang","year":"2021","unstructured":"Tang R, Feng W, Chen Y, Ge N (2021) Noma-based uav communications for maritime coverage enhancement. China Commun 18(4):230\u2013243","journal-title":"China Commun"},{"key":"151_CR44","doi-asserted-by":"crossref","unstructured":"Thapliyal S, Wazid M, Singh DP, Das AK, Islam SH (2023) Robust authenticated key agreement protocol for internet of vehicles-envisioned intelligent transportation system. J Syst Architect 142:102937","DOI":"10.1016\/j.sysarc.2023.102937"},{"issue":"6","key":"151_CR45","doi-asserted-by":"publisher","first-page":"6389","DOI":"10.1109\/TITS.2023.3252082","volume":"24","author":"H Tan","year":"2023","unstructured":"Tan H, Zheng W, Vijayakumar P (2023) Secure and efficient authenticated key management scheme for uav-assisted infrastructure-less iovs. IEEE Trans Intell Transport Syst 24(6):6389\u20136400","journal-title":"IEEE Trans Intell Transport Syst"},{"key":"151_CR46","doi-asserted-by":"crossref","unstructured":"Wang D, Cao Y, Lam K-Y, Hu Y, Kaiwartya O (2024) Authentication and key agreement based on three factors and puf for uavs-assisted post-disaster emergency communication. IEEE Internet of Things J","DOI":"10.1109\/JIOT.2024.3371101"},{"issue":"11","key":"151_CR47","doi-asserted-by":"publisher","first-page":"3475","DOI":"10.1109\/JSAC.2021.3088692","volume":"39","author":"Y Wang","year":"2021","unstructured":"Wang Y, Feng W, Wang J, Quek TQ (2021) Hybrid satellite-uav-terrestrial networks for 6g ubiquitous coverage: A maritime communications perspective. IEEE J Select Areas Commun 39(11):3475\u20133490","journal-title":"IEEE J Select Areas Commun"},{"key":"151_CR48","doi-asserted-by":"crossref","unstructured":"Wenger E, Werner M (2011) Evaluating 16-bit processors for elliptic curve cryptography. In: Smart Card Research and Advanced Applications: 10th IFIP WG 8.8\/11.2 International Conference, CARDIS 2011, Leuven, Belgium, 14-16 September, 2011, Revised Selected Papers 10, pp 166\u2013181. Springer","DOI":"10.1007\/978-3-642-27257-8_11"},{"issue":"6","key":"151_CR49","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1109\/MWC.008.2100554","volume":"29","author":"J-B Wang","year":"2022","unstructured":"Wang J-B, Zeng C, Ding C, Zhang H, Lin M, Wang J (2022) Unmanned surface vessel assisted maritime wireless communication toward 6g: Opportunities and challenges. IEEE Wireless Commun 29(6):72\u201379","journal-title":"IEEE Wireless Commun"},{"key":"151_CR50","doi-asserted-by":"crossref","unstructured":"Xie X, Wu B, Hou B (2023) Bephap: A blockchain-based efficient privacy-preserving handover authentication protocol with key agreement for internet of vehicles. J Syst Architect 138:102869","DOI":"10.1016\/j.sysarc.2023.102869"},{"issue":"12","key":"151_CR51","doi-asserted-by":"publisher","first-page":"7700","DOI":"10.1109\/TII.2020.2974047","volume":"16","author":"T Yang","year":"2020","unstructured":"Yang T, Jiang Z, Sun R, Cheng N, Feng H (2020) Maritime search and rescue based on group mobile computing for unmanned aerial vehicles and unmanned surface vehicles. IEEE Trans Indust Inf 16(12):7700\u20137708","journal-title":"IEEE Trans Indust Inf"},{"key":"151_CR52","doi-asserted-by":"crossref","unstructured":"Yu S, Park K (2022) Isg-slas: Secure and lightweight authentication and key agreement scheme for industrial smart grid using fuzzy extractor. J Syst Architect 131:102698","DOI":"10.1016\/j.sysarc.2022.102698"},{"key":"151_CR53","doi-asserted-by":"crossref","unstructured":"Zhang J, Cui J, Zhong H, Chen Z, Liu L (2019) Pa-crt: Chinese remainder theorem based conditional privacy-preserving authentication scheme in vehicular ad-hoc networks. IEEE Trans Depend Secure Comput 18(2):722\u2013735","DOI":"10.1109\/TDSC.2019.2904274"},{"issue":"4","key":"151_CR54","doi-asserted-by":"publisher","first-page":"2982","DOI":"10.1109\/TNSE.2020.3029784","volume":"8","author":"J Zhang","year":"2021","unstructured":"Zhang J, Cui J, Zhong H, Bolodurina I, Liu L (2021) Intelligent drone-assisted anonymous authentication and key agreement for 5g\/b5g vehicular ad-hoc networks. IEEE Trans Netw Sci Eng 8(4):2982\u20132994","journal-title":"IEEE Trans Netw Sci Eng"}],"container-title":["Journal of King Saud University Computer and Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44443-025-00151-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s44443-025-00151-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44443-025-00151-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T05:59:55Z","timestamp":1757311195000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s44443-025-00151-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,29]]},"references-count":54,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,8]]}},"alternative-id":["151"],"URL":"https:\/\/doi.org\/10.1007\/s44443-025-00151-x","relation":{},"ISSN":["1319-1578","2213-1248"],"issn-type":[{"type":"print","value":"1319-1578"},{"type":"electronic","value":"2213-1248"}],"subject":[],"published":{"date-parts":[[2025,7,29]]},"assertion":[{"value":"25 April 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 June 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 July 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no relevant financial or non-financial interests to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}}],"article-number":"140"}}