{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:46:46Z","timestamp":1762004806338,"version":"3.41.0"},"reference-count":67,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2016,4,29]],"date-time":"2016-04-29T00:00:00Z","timestamp":1461888000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Web"],"published-print":{"date-parts":[[2016,5,25]]},"abstract":"<jats:p>Watermarking protocols are used in conjunction with digital watermarking techniques to protect digital copyright on the Internet. They define the schemes of the web transactions by which buyers can purchase protected digital content distributed by content providers in a secure manner. Over the last few years, significant examples of watermarking protocols have been proposed in literature. However, a detailed examination of such protocols has revealed a number of problems that have to be addressed in order to make them suited for current web context. Therefore, based on the most relevant problems derived from literature, this article identifies the main challenges posed by the development of watermarking protocols for web context and presents a watermarking protocol that follows a new secure, buyer-centric and mediated design approach able to meet such challenges.<\/jats:p>","DOI":"10.1145\/2856036","type":"journal-article","created":{"date-parts":[[2016,5,2]],"date-time":"2016-05-02T12:16:07Z","timestamp":1462191367000},"page":"1-28","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["A Buyer-Friendly and Mediated Watermarking Protocol for Web Context"],"prefix":"10.1145","volume":"10","author":[{"given":"Franco","family":"Frattolillo","sequence":"first","affiliation":[{"name":"University of Sannio, Benevento, Italy"}]}],"member":"320","published-online":{"date-parts":[[2016,4,29]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"M. Barni and F. Bartolini. 2004. Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications. CRC Press Boca Raton FL.   M. Barni and F. Bartolini. 2004. Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications. CRC Press Boca Raton FL."},{"key":"e_1_2_1_2_1","volume-title":"Proceedings of the 12th Annual International Cryptology Conference. Lecture Notes in Computer Science, E. F. Brickell (Ed.)","volume":"740","author":"Bellare M.","unstructured":"M. Bellare and O. Goldreich . 1992. On defining proofs of knowledge . In Proceedings of the 12th Annual International Cryptology Conference. Lecture Notes in Computer Science, E. F. Brickell (Ed.) , Vol. 740 . Springer, Berlin, 390--420. M. Bellare and O. Goldreich. 1992. On defining proofs of knowledge. In Proceedings of the 12th Annual International Cryptology Conference. Lecture Notes in Computer Science, E. F. Brickell (Ed.), Vol. 740. Springer, Berlin, 390--420."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_25"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30574-3_11"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2228342"},{"volume-title":"Proceedings of the 10th USENIX Security Symposium. The USENIX Association, Washington, D.C., 297--308","author":"Boneh D.","key":"e_1_2_1_6_1","unstructured":"D. Boneh , X. Ding , G. Tsudik , and C. M. Wong . 2001. A method for fast revocation of public key certificates and security capabilities . In Proceedings of the 10th USENIX Security Symposium. The USENIX Association, Washington, D.C., 297--308 . D. Boneh, X. Ding, G. Tsudik, and C. M. Wong. 2001. A method for fast revocation of public key certificates and security capabilities. In Proceedings of the 10th USENIX Security Symposium. The USENIX Association, Washington, D.C., 297--308."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIW.2009.84"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/874063.875553"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2008.926988"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.08.008"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.923725"},{"key":"e_1_2_1_13_1","volume-title":"Digital Watermarking: Principles & Practice. Morgan Kaufman","author":"Cox I.","year":"2001","unstructured":"I. Cox , J. Bloom , and M. Miller . 2001 . Digital Watermarking: Principles & Practice. Morgan Kaufman , Burlington, MA . I. Cox, J. Bloom, and M. Miller. 2001. Digital Watermarking: Principles & Practice. Morgan Kaufman, Burlington, MA."},{"key":"e_1_2_1_14_1","volume-title":"Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography Lecture Notes in Computer Science, K. Kim (Ed.)","volume":"1992","author":"Damg\u00e5rd I.","unstructured":"I. Damg\u00e5rd and M. Jurik . 2001. A generalisation, a simplification and some applications of Paillier\u2019s probabilistic public-key system . In Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography Lecture Notes in Computer Science, K. Kim (Ed.) , Vol. 1992 . Springer, Berlin, 119--136. I. Damg\u00e5rd and M. Jurik. 2001. A generalisation, a simplification and some applications of Paillier\u2019s probabilistic public-key system. In Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography Lecture Notes in Computer Science, K. Kim (Ed.), Vol. 1992. Springer, Berlin, 119--136."},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICETET.2008.61"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1597817.1597820"},{"volume-title":"Proceedings of the IEEE International Symposium on Electronic Commerce and Security. IEEE Computer Society","author":"Deng M.","key":"e_1_2_1_17_1","unstructured":"M. Deng and B. Preneel . 2008a. Attacks on two buyer-seller watermarking protocols and an improvement for revocable anonymity . In Proceedings of the IEEE International Symposium on Electronic Commerce and Security. IEEE Computer Society , Washington, DC, Guangzhou, China, 923--929. M. Deng and B. Preneel. 2008a. Attacks on two buyer-seller watermarking protocols and an improvement for revocable anonymity. In Proceedings of the IEEE International Symposium on Electronic Commerce and Security. IEEE Computer Society, Washington, DC, Guangzhou, China, 923--929."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIW.2008.28"},{"key":"e_1_2_1_19_1","volume-title":"RSA Conference","volume":"2612","author":"Ding X.","year":"2003","unstructured":"X. Ding and G. Tsudik . 2003. Simple identity-based cryptography with mediated RSA. In The Cryptographers\u2019 Track at the RSA Conference 2003 . Lecture Notes in Computer Science, M. Joye (Ed.) , Vol. 2612 . Springer, Berlin, 193--210. X. Ding and G. Tsudik. 2003. Simple identity-based cryptography with mediated RSA. In The Cryptographers\u2019 Track at the RSA Conference 2003. Lecture Notes in Computer Science, M. Joye (Ed.), Vol. 2612. Springer, Berlin, 193--210."},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC2693"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/MUE.2007.102"},{"key":"e_1_2_1_22_1","doi-asserted-by":"crossref","unstructured":"C. Fontaine and F. Galand. 2007. A survey of homomorphic encryption for nonspecialists. EURASIP Journal on Information Security 2007 Article 13801 10 pages. DOI:http:\/\/dx.doi.org\/10.1155\/2007\/13801    10.1155\/2007\nC. Fontaine and F. Galand. 2007. A survey of homomorphic encryption for nonspecialists. EURASIP Journal on Information Security 2007 Article 13801 10 pages. DOI:http:\/\/dx.doi.org\/10.1155\/2007\/13801","DOI":"10.1155\/2007\/13801"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.903849"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxu015"},{"key":"e_1_2_1_25_1","volume-title":"Proceedings of the 3rd Australasian Information Security Workshop. Conferences in Research and Practice in Information Technology, P. Montague and R. Safavi-Naini (Eds.)","volume":"44","author":"Frattolillo F.","unstructured":"F. Frattolillo and S. D\u2019Onofrio . 2005. Applying web oriented technologies to implement an adaptive spread spectrum watermarking procedure and a flexible DRM platform . In Proceedings of the 3rd Australasian Information Security Workshop. Conferences in Research and Practice in Information Technology, P. Montague and R. Safavi-Naini (Eds.) , Vol. 44 . Australian Computer Society, Sydney, Australia, Newcastle, Australia, 159--167. F. Frattolillo and S. D\u2019Onofrio. 2005. Applying web oriented technologies to implement an adaptive spread spectrum watermarking procedure and a flexible DRM platform. In Proceedings of the 3rd Australasian Information Security Workshop. Conferences in Research and Practice in Information Technology, P. Montague and R. Safavi-Naini (Eds.), Vol. 44. Australian Computer Society, Sydney, Australia, Newcastle, Australia, 159--167."},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/IAS.2008.9"},{"volume-title":"Proceedings of the 12th IEEE International Symposium on Web Systems Evolution. IEEE Computer Society","author":"Frattolillo F.","key":"e_1_2_1_27_1","unstructured":"F. Frattolillo and F. Landolfi . 2010. A cluster grids based platform for digital copyright protection . In Proceedings of the 12th IEEE International Symposium on Web Systems Evolution. IEEE Computer Society , Washington, DC, Timisoara, Romania, 83--87. F. Frattolillo and F. Landolfi. 2010. A cluster grids based platform for digital copyright protection. In Proceedings of the 12th IEEE International Symposium on Web Systems Evolution. IEEE Computer Society, Washington, DC, Timisoara, Romania, 83--87."},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2009.416"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/93.959104"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72738-5_19"},{"key":"e_1_2_1_31_1","volume-title":"Delp and P. W. Wong (Eds.)","volume":"3657","author":"Hartung F.","unstructured":"F. Hartung , J. K. Su , and B. Girod . 1999. Spread spectrum watermarking: Malicious attacks and counterattacks. In Security and Watermarking of Multimedia Contents (Proceedings of SPIE), E. J . Delp and P. W. Wong (Eds.) , Vol. 3657 . SPIE, Bellingham WA, San Jose, CA, 147--158. F. Hartung, J. K. Su, and B. Girod. 1999. Spread spectrum watermarking: Malicious attacks and counterattacks. In Security and Watermarking of Multimedia Contents (Proceedings of SPIE), E. J. Delp and P. W. Wong (Eds.), Vol. 3657. SPIE, Bellingham WA, San Jose, CA, 147--158."},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/MINES.2009.132"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.4304\/jmm.4.3.161-168"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/IAS.2007.17"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2008.2002939"},{"key":"e_1_2_1_36_1","volume-title":"Delp and P. W. Wong (Eds.)","volume":"4675","author":"Katzenbeisser S.","unstructured":"S. Katzenbeisser and H. Veith . 2002. Securing symmetric watermarking schemes against protocol attacks. In Security and Watermarking of Multimedia Contents IV (Proceedings of SPIE), E. J . Delp and P. W. Wong (Eds.) , Vol. 4675 . SPIE, Bellingham WA, San Jose, CA, 260--268. S. Katzenbeisser and H. Veith. 2002. Securing symmetric watermarking schemes against protocol attacks. In Security and Watermarking of Multimedia Contents IV (Proceedings of SPIE), E. J. Delp and P. W. Wong (Eds.), Vol. 4675. SPIE, Bellingham WA, San Jose, CA, 260--268."},{"key":"e_1_2_1_37_1","series-title":"Lecture Notes in Computer Science","volume-title":"Proceedings of the 7th International Information Security Conference","author":"Ku W.","unstructured":"W. Ku and C.-H. Chi . 2004. Survey on the technological aspects of digital rights management . In Proceedings of the 7th International Information Security Conference . Lecture Notes in Computer Science , K. Zhang and Y. Zheng (Eds.), Vol. 3225 . Springer , Berlin , 391--403. W. Ku and C.-H. Chi. 2004. Survey on the technological aspects of digital rights management. In Proceedings of the 7th International Information Security Conference. Lecture Notes in Computer Science, K. Zhang and Y. Zheng (Eds.), Vol. 3225. Springer, Berlin, 391--403."},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2005.859383"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1626195.1626266"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.2174\/2215081102666140225004344"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2004.837553"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/11922841_35"},{"key":"e_1_2_1_43_1","volume-title":"Proceedings of the 7th International Conference on Genetic and Evolutionary Computing. Advances in Intelligent Systems and Computing, J.-S. et al. Pan (Ed.)","volume":"238","author":"Liu E.","unstructured":"E. Liu , Z. Liu , and F. Shao . 2014. Digital rights management and access control in multimedia social networks . In Proceedings of the 7th International Conference on Genetic and Evolutionary Computing. Advances in Intelligent Systems and Computing, J.-S. et al. Pan (Ed.) , Vol. 238 . Springer, Berlin, 257--266. E. Liu, Z. Liu, and F. Shao. 2014. Digital rights management and access control in multimedia social networks. In Proceedings of the 7th International Conference on Genetic and Evolutionary Computing. Advances in Intelligent Systems and Computing, J.-S. et al. Pan (Ed.), Vol. 238. Springer, Berlin, 257--266."},{"key":"e_1_2_1_44_1","unstructured":"K. J. R. Liu W. Trappe Z. J. Wang M. Wu and H. Zhao. 2005. Multimedia Fingerprinting Forensics for Traitor Tracing. Hindawi Publishing Corporation New York NY.  K. J. R. Liu W. Trappe Z. J. Wang M. Wu and H. Zhao. 2005. Multimedia Fingerprinting Forensics for Traitor Tracing. Hindawi Publishing Corporation New York NY."},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/83.913598"},{"key":"e_1_2_1_46_1","series-title":"Lecture Notes in Computer Science","volume-title":"Proceedings of Eurocrypt \u201999","author":"Paillier P.","unstructured":"P. Paillier . 1999. Public-key cryptosystems based on composite degree residuosity classes . In Proceedings of Eurocrypt \u201999 . Lecture Notes in Computer Science , Vol. 1592 . Springer , Berlin , 223--238. P. Paillier. 1999. Public-key cryptosystems based on composite degree residuosity classes. In Proceedings of Eurocrypt \u201999. Lecture Notes in Computer Science, Vol. 1592. Springer, Berlin, 223--238."},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/79.879339"},{"key":"e_1_2_1_48_1","volume-title":"Electronic Imaging","author":"Petitcolas F. A. P.","year":"2001","unstructured":"F. A. P. Petitcolas and others. 2001. A public automated web-based evaluation service for watermarking schemes: StirMark benchmark . In Electronic Imaging 2001 , Security and Watermarking of Multimedia Contents (January 22--26, 2001) (Proceedings of SPIE), P. W. Wong and E. J. Delp (Eds.), Vol. 4314 . SPIE , Bellingham WA, San Jose, CA, 575--584. F. A. P. Petitcolas and others. 2001. A public automated web-based evaluation service for watermarking schemes: StirMark benchmark. In Electronic Imaging 2001, Security and Watermarking of Multimedia Contents (January 22--26, 2001) (Proceedings of SPIE), P. W. Wong and E. J. Delp (Eds.), Vol. 4314. SPIE, Bellingham WA, San Jose, CA, 575--584."},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03688-0_23"},{"key":"#cr-split#-e_1_2_1_51_1.1","doi-asserted-by":"crossref","unstructured":"J. P. Prins Z. Erkin and R. L. Lagendijk. 2007. Anonymous fingerprinting with robust QIM watermarking techniques. EURASIP Journal on Information Security 2007 Article 31340 13 pages. DOI:http:\/\/dx.doi.org\/10.1155\/2007\/31340 10.1155\/2007","DOI":"10.1155\/2007\/31340"},{"key":"#cr-split#-e_1_2_1_51_1.2","doi-asserted-by":"crossref","unstructured":"J. P. Prins Z. Erkin and R. L. Lagendijk. 2007. Anonymous fingerprinting with robust QIM watermarking techniques. EURASIP Journal on Information Security 2007 Article 31340 13 pages. DOI:http:\/\/dx.doi.org\/10.1155\/2007\/31340","DOI":"10.1155\/2007\/31340"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1006\/jvci.1998.0391"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/366173.366208"},{"key":"e_1_2_1_54_1","doi-asserted-by":"crossref","unstructured":"K. Rannenberg D. Royer and A. Deuker. 2009. The Future of Identity in the Information Society - Challenges and Opportunities. Springer Berlin.   K. Rannenberg D. Royer and A. Deuker. 2009. The Future of Identity in the Information Society - Challenges and Opportunities. Springer Berlin.","DOI":"10.1007\/978-3-642-01820-6"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2072830"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2003.809378"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.05.006"},{"key":"e_1_2_1_58_1","volume-title":"ProcInternational Conference on Security and Cryptography. IEEE Computer Society","author":"Williams D. M.","year":"2010","unstructured":"D. M. Williams , H. Treharne , and A. T. S. Ho . 2010 . On the importance of one-time key pairs in buyer-seller watermarking protocols . In ProcInternational Conference on Security and Cryptography. IEEE Computer Society , Washington, DC, Athens, Greece, 441--446. D. M. Williams, H. Treharne, and A. T. S. Ho. 2010. On the importance of one-time key pairs in buyer-seller watermarking protocols. In ProcInternational Conference on Security and Cryptography. IEEE Computer Society, Washington, DC, Athens, Greece, 441--446."},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04438-0_24"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.1276103"},{"key":"e_1_2_1_61_1","first-page":"53","article-title":"Comments on a buyer-seller watermarking protocol for large scale networks","volume":"14","author":"Wu S.","year":"2012","unstructured":"S. Wu and Q. Pu . 2012 . Comments on a buyer-seller watermarking protocol for large scale networks . International Journal of Network Security 14 , 1, 53 -- 58 . S. Wu and Q. Pu. 2012. Comments on a buyer-seller watermarking protocol for large scale networks. International Journal of Network Security 14, 1, 53--58.","journal-title":"International Journal of Network Security"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/AINAW.2007.168"},{"volume-title":"Proceedings of the 29th IEEE Conference on Information Communications. IEEE Computer Society","author":"Yu S.","key":"e_1_2_1_63_1","unstructured":"S. Yu , C. Wang , K. Ren , and W. Lou . 2010a. Achieving secure, scalable, and fine-grained data access control in cloud computing . In Proceedings of the 29th IEEE Conference on Information Communications. IEEE Computer Society , Washington, DC, San Diego, CA, 534--542. S. Yu, C. Wang, K. Ren, and W. Lou. 2010a. Achieving secure, scalable, and fine-grained data access control in cloud computing. In Proceedings of the 29th IEEE Conference on Information Communications. IEEE Computer Society, Washington, DC, San Diego, CA, 534--542."},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755688.1755720"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1049\/ip-ifs:20055069"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxr078"},{"key":"e_1_2_1_67_1","first-page":"247","article-title":"Security and trust in digital rights management: A survey","volume":"9","author":"Zhang Z.","year":"2009","unstructured":"Z. Zhang , Q. Pei , J. Ma , and L. Yang . 2009 . Security and trust in digital rights management: A survey . International Journal of Network Security 9 , 3, 247 -- 263 . Z. Zhang, Q. Pei, J. Ma, and L. Yang. 2009. Security and trust in digital rights management: A survey. International Journal of Network Security 9, 3, 247--263.","journal-title":"International Journal of Network Security"},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2006.885023"}],"container-title":["ACM Transactions on the Web"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2856036","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2856036","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:54:11Z","timestamp":1750222451000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2856036"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4,29]]},"references-count":67,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2016,5,25]]}},"alternative-id":["10.1145\/2856036"],"URL":"https:\/\/doi.org\/10.1145\/2856036","relation":{},"ISSN":["1559-1131","1559-114X"],"issn-type":[{"type":"print","value":"1559-1131"},{"type":"electronic","value":"1559-114X"}],"subject":[],"published":{"date-parts":[[2016,4,29]]},"assertion":[{"value":"2015-03-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2015-12-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-04-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}