{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:38:43Z","timestamp":1740123523411,"version":"3.37.3"},"reference-count":63,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2018,8,23]],"date-time":"2018-08-23T00:00:00Z","timestamp":1534982400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61602275","61632020"],"award-info":[{"award-number":["61602275","61632020"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"the Open Project of Co-Innovation Center for Information Supply and Assurance Technology,Anhui University","award":["ADXXBZ201702"],"award-info":[{"award-number":["ADXXBZ201702"]}]},{"name":"Shandong Province Higher Educational Science and Technology Program","award":["J15LN01"],"award-info":[{"award-number":["J15LN01"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1007\/s11227-018-2534-z","type":"journal-article","created":{"date-parts":[[2018,8,23]],"date-time":"2018-08-23T05:18:50Z","timestamp":1535001530000},"page":"3099-3122","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience"],"prefix":"10.1007","volume":"75","author":[{"given":"Chengyu","family":"Hu","sequence":"first","affiliation":[]},{"given":"Rupeng","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Pengtao","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Tong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Fanyu","family":"Kong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,23]]},"reference":[{"issue":"1","key":"2534_CR1","first-page":"17","volume":"11","author":"T Fortis","year":"2015","unstructured":"Fortis T, Munteanu V, Negru V (2015) A taxonomic view of cloud computing services. Int J Comput Sci Eng 11(1):17\u201328","journal-title":"Int J Comput Sci Eng"},{"doi-asserted-by":"publisher","unstructured":"Gao C, Cheng Q, Li X, Xia S (2018) Cloud-assisted privacy-preserving profile-matching scheme under multiple keys in mobile social network. Clust Comput. \n                    https:\/\/doi.org\/10.1007\/s10,586-017-1649-y","key":"2534_CR2","DOI":"10.1007\/s10,586-017-1649-y"},{"doi-asserted-by":"publisher","unstructured":"Shen J, Gui Z, Ji S, Shen J, Tan H (2018) Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks. J Netw Comput Appl. \n                    https:\/\/doi.org\/10.1016\/j.jnca.2018.01.003","key":"2534_CR3","DOI":"10.1016\/j.jnca.2018.01.003"},{"issue":"7","key":"2534_CR4","doi-asserted-by":"publisher","first-page":"e3856","DOI":"10.1002\/cpe.3856","volume":"29","author":"K Gai","year":"2017","unstructured":"Gai K, Liu M, Hassan H (2017) Secure cyber incident analytics framework using monte carlo simulations for financial cybersecurity insurance in cloud computing. Concurr Comput Pract Exp 29(7):e3856","journal-title":"Concurr Comput Pract Exp"},{"key":"2534_CR5","first-page":"21","volume":"32","author":"E Bertino","year":"2009","unstructured":"Bertino E, Paci F, Ferrini R, Shang N (2009) Privacy-preserving digital identity management for cloud computing. IEEE Data Eng Bull 32:21\u201327","journal-title":"IEEE Data Eng Bull"},{"key":"2534_CR6","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/j.jnca.2018.01.014","volume":"107","author":"J Xu","year":"2018","unstructured":"Xu J, Wei L, Zhang Y, Wang A, Zhou F, Cz Gao (2018) Dynamic fully homomorphic encryption-based merkle tree for lightweight streaming authenticated data structures. J Netw Comput Appl 107:113\u2013124","journal-title":"J Netw Comput Appl"},{"issue":"6","key":"2534_CR7","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MIC.2004.53","volume":"8","author":"J Joshi","year":"2004","unstructured":"Joshi J, Bhatti R, Bertino E, Ghafoor A (2004) Access control language for multidomain environments. IEEE Internet Comput 8(6):40\u201350","journal-title":"IEEE Internet Comput"},{"key":"2534_CR8","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/s00500-016-2330-8","volume":"22","author":"H Zhong","year":"2018","unstructured":"Zhong H, Zhu W, Xu Y, Cui J (2018) Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage. Soft Comput 22:243\u2013251","journal-title":"Soft Comput"},{"doi-asserted-by":"crossref","unstructured":"Hesamifard E, Takabi H, Ghasemi M, Jones C (2017) Privacy-preserving machine learning in cloud. In: CCSW 2017, pp 39\u201343","key":"2534_CR9","DOI":"10.1145\/3140649.3140655"},{"doi-asserted-by":"publisher","unstructured":"Li P, Li J, Huang Z, Gao C, Chen W, Chen K (2017) Privacy-preserving outsourced classification in cloud computing. Clust Comput. \n                    https:\/\/doi.org\/10.1007\/s10,586-017-0849-9","key":"2534_CR10","DOI":"10.1007\/s10,586-017-0849-9"},{"doi-asserted-by":"crossref","unstructured":"Ding W, Yan Z, Deng R (2017) Secure encrypted data deduplication with ownership proof and user revocation. In: ICA3PP 2017, pp 297\u2013312","key":"2534_CR11","DOI":"10.1007\/978-3-319-65482-9_20"},{"issue":"5","key":"2534_CR12","doi-asserted-by":"publisher","first-page":"1206","DOI":"10.1109\/TPDS.2014.2318320","volume":"26","author":"J Li","year":"2015","unstructured":"Li J, Li Y, Chen X, Lee P, Lou W (2015) A hybrid cloud approach for secure authorized deduplication. IEEE Trans Parallel Distrib Syst 26(5):1206\u20131216","journal-title":"IEEE Trans Parallel Distrib Syst"},{"doi-asserted-by":"crossref","unstructured":"Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. In: Eurocrypt 2004, pp 506\u2013522","key":"2534_CR13","DOI":"10.1007\/978-3-540-24676-3_30"},{"key":"2534_CR14","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1016\/j.ins.2017.09.029","volume":"423","author":"J Cui","year":"2018","unstructured":"Cui J, Zhou H, Zhong H, Xu Y (2018) Akser: attribute-based keyword search with efficient revocation in cloud computing. Inf Sci 423:343\u2013352","journal-title":"Inf Sci"},{"doi-asserted-by":"crossref","unstructured":"Lai J, Zhou X, Deng RH, Li Y, Chen K (2013) Expressive search on encrypted data. In: AisaCCS 2013, pp 243\u2013252","key":"2534_CR15","DOI":"10.1145\/2484313.2484345"},{"key":"2534_CR16","doi-asserted-by":"publisher","first-page":"12,702","DOI":"10.1109\/ACCESS.2017.2716971","volume":"5","author":"Y Xu","year":"2017","unstructured":"Xu Y, Wang M, Zhong H, Cui J, Liu L, Franqueira V (2017) Verifiable public key encryption scheme with equality test in 5g networks. IEEE Access 5:12,702\u201312,713","journal-title":"IEEE Access"},{"key":"2534_CR17","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1016\/j.jnca.2017.12.017","volume":"106","author":"L Yang","year":"2018","unstructured":"Yang L, Han Z, Huang Z, Ma J (2018) A remotely keyed file encryption scheme under mobile cloud computing. J Netw Comput Appl 106:90\u201399","journal-title":"J Netw Comput Appl"},{"issue":"10","key":"2534_CR18","doi-asserted-by":"publisher","first-page":"1007","DOI":"10.1002\/sec.1395","volume":"9","author":"H Zhong","year":"2016","unstructured":"Zhong H, Cui J, Shi R, Xia C (2016) Many-to-one homomorphic encryption scheme. Secur Commun Netw 9(10):1007\u20131015","journal-title":"Secur Commun Netw"},{"issue":"8","key":"2534_CR19","doi-asserted-by":"publisher","first-page":"2201","DOI":"10.1109\/TPDS.2013.271","volume":"25","author":"J Li","year":"2014","unstructured":"Li J, Huang X, Li J, Chen X, Xiang Y (2014) Securely outsourcing attribute-based encryption with checkability. IEEE Trans Parallel Distrib Syst 25(8):2201\u20132210","journal-title":"IEEE Trans Parallel Distrib Syst"},{"doi-asserted-by":"crossref","unstructured":"Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D (2007) Provable data possession at untrusted stores. In: CCS 2007. ACM, pp 598\u2013609","key":"2534_CR20","DOI":"10.1145\/1315245.1315318"},{"key":"2534_CR21","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.knosys.2014.04.010","volume":"79","author":"J Li","year":"2015","unstructured":"Li J, Liu Z, Chen X, Xhafa F, Tan X, Wong DS (2015) L-encdb: a lightweight framework for privacy-preserving data queries in cloud computing. Knowl Based Syst 79:18\u201326","journal-title":"Knowl Based Syst"},{"doi-asserted-by":"publisher","unstructured":"Li B, Huang Y, Liu Z, Li J, Tian Z, Yiu SM (2018) Hybridoram: practical oblivious cloud storage with constant bandwidth. Inf Sci. \n                    https:\/\/doi.org\/10.1016\/j.ins.2018.02.019","key":"2534_CR22","DOI":"10.1016\/j.ins.2018.02.019"},{"issue":"4","key":"2534_CR23","doi-asserted-by":"publisher","first-page":"694","DOI":"10.1007\/s00145-010-9077-7","volume":"24","author":"S Hohenberger","year":"2011","unstructured":"Hohenberger S, Rothblum G, shelat A, Vaikuntanathan V (2011) Securely obfuscating re-encryption. Proceedings of the Theory of Cryptography Conference. J Cryptol 24(4):694\u2013719","journal-title":"J Cryptol"},{"issue":"2","key":"2534_CR24","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1109\/TC.2013.208","volume":"64","author":"J Li","year":"2015","unstructured":"Li J, Li J, Chen X, Jia C, Lou W (2015) Identity-based encryption with outsourced revocation in cloud computing. IEEE Trans Comput 64(2):425\u2013437","journal-title":"IEEE Trans Comput"},{"issue":"6","key":"2534_CR25","doi-asserted-by":"publisher","first-page":"1231","DOI":"10.1007\/s11390-017-1797-9","volume":"32","author":"Q Liu","year":"2017","unstructured":"Liu Q, Guo Y, Wu J, Wang G (2017) Effective query grouping strategy in clouds. J Comput Sci Technol 32(6):1231\u20131249","journal-title":"J Comput Sci Technol"},{"doi-asserted-by":"crossref","unstructured":"Biham E, Shamir A (1997) Differential fault analysis of secret key cryptosystems. In: Advances in Cryptology-CRYPTO 1997. Springer, pp 513\u2013525","key":"2534_CR26","DOI":"10.1007\/BFb0052259"},{"doi-asserted-by":"crossref","unstructured":"Gandolff K, Mourtel C, Olivier F (2001) Electromagnetic analysis: concrete results. In: CHES 2001, pp 251\u2013261","key":"2534_CR27","DOI":"10.1007\/3-540-44709-1_21"},{"doi-asserted-by":"crossref","unstructured":"Biham E, Carmeli Y, Shamir A (2008) Bug attacks. In: Advances in Cryptology-CRYPTO 2008. Springer, pp 221\u2013240","key":"2534_CR28","DOI":"10.1007\/978-3-540-85174-5_13"},{"unstructured":"Halderman J, Schoen S, Nadia H, Clarkson W, Paul W, Calandrino J, Feldman A, Appelbaum J, Felten E (2008) Lest we remember: cold-boot attacks on encryption keys. In: USENIX Security Symposium 2008, pp 45\u201360","key":"2534_CR29"},{"doi-asserted-by":"crossref","unstructured":"Ristenpart T, Tromer E, Shacham H, Savage S (2009) Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In: CCS, pp 199\u2013212 (2009)","key":"2534_CR30","DOI":"10.1145\/1653662.1653687"},{"doi-asserted-by":"crossref","unstructured":"Zhang Y, Juels A, Reiter M, Ristenpart T (2012) Cross-vm side channels and their use to extract private keys. In: CCS, pp 305\u2013316 (2012)","key":"2534_CR31","DOI":"10.1145\/2382196.2382230"},{"unstructured":"Inci M, Gulmezoglu B, Irazoqui G, Eisenbarth T, Sunar B (2015) Seriously get off my cloud cross-vm rsa key recovery in a public cloud. Cryptology ePrint Archive 2015:898","key":"2534_CR32"},{"doi-asserted-by":"crossref","unstructured":"Bellare M, Cash D, Miller R (2011) Cryptography secure against related-key attacks and tampering. In: Advances in Cryptology-ASIACRYPT 2011. Springer, pp 486\u2013503","key":"2534_CR33","DOI":"10.1007\/978-3-642-25385-0_26"},{"doi-asserted-by":"crossref","unstructured":"Gennaro R, Lysyanskaya A, Malkin T, Micali S, Rabin T (2004) Algorithmic tamper-proof (atp) security: theoretical foundations for security against hardware tampering. In: TCC 2004. Springer, pp 258\u2013277","key":"2534_CR34","DOI":"10.1007\/978-3-540-24638-1_15"},{"doi-asserted-by":"crossref","unstructured":"Wee H (2012) Public key encryption against related key attacks. In: PKC 2012. Springer, pp 262\u2013279","key":"2534_CR35","DOI":"10.1007\/978-3-642-30057-8_16"},{"unstructured":"Akkar ML, Giraud C (2001) An implementation of des and aes, secure against some attacks. In: CHES 2001, pp 309\u2013318","key":"2534_CR36"},{"unstructured":"Trichina E, De Seta D, Germani L (2002) Simplified adaptive multiplicative masking for aes. In: CHES 2002, pp 187\u2013197","key":"2534_CR37"},{"doi-asserted-by":"crossref","unstructured":"Dziembowski S, Pietrzak K (2008) Leakage-resilient cryptography. In: FOCS 2008, pp 293\u2013302","key":"2534_CR38","DOI":"10.1109\/FOCS.2008.56"},{"doi-asserted-by":"crossref","unstructured":"Juma A, Vahlis Y (2010) Protecting cryptographic keys against continual leakage. In: Advances in Cryptology-CRYPTO 2010. Springer, pp 41\u201358","key":"2534_CR39","DOI":"10.1007\/978-3-642-14623-7_3"},{"unstructured":"Chow S, Dodis Y, Rouselakis Y, Waters B (2010) Practical leakageresilient identity-based encryption from simple assumptions. In: CCS 2010, pp 152\u2013161","key":"2534_CR40"},{"doi-asserted-by":"crossref","unstructured":"Boyle E, Segev G, Wichs D (2011) Fully leakage-resilient signatures. In: Advances in Cryptology-EUROCRYPT 2011. Springer, pp 89\u2013108","key":"2534_CR41","DOI":"10.1007\/978-3-642-20465-4_7"},{"doi-asserted-by":"crossref","unstructured":"Halevi S, Lin H (2011) After-the-fact leakage in public-key encryption. In: TCC 2011, pp 474\u2013495","key":"2534_CR42","DOI":"10.1007\/978-3-642-19571-6_8"},{"issue":"4","key":"2534_CR43","doi-asserted-by":"publisher","first-page":"464","DOI":"10.1093\/comjnl\/bxs133","volume":"56","author":"M Zhang","year":"2013","unstructured":"Zhang M, Yang B, Takagi T (2013) Bounded leakage-resilient functional encryption with hidden vector predicate. Comput J 56(4):464\u2013477","journal-title":"Comput J"},{"key":"2534_CR44","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1016\/j.ins.2017.05.031","volume":"412","author":"Z Huang","year":"2017","unstructured":"Huang Z, Liu S, Mao X, Chen K, Li J (2017) Insight of the protection for data security under selective opening attacks. Inf Sci 412:223\u2013241","journal-title":"Inf Sci"},{"doi-asserted-by":"crossref","unstructured":"Brakerski Z, Kalai Y, Katz J, Vaikuntanathan V (2010) Overcoming the hole in the bucket: public-key cryptography resilient to continual memory leakage. In: FOCS 2010, pp 501\u2013510","key":"2534_CR45","DOI":"10.1109\/FOCS.2010.55"},{"doi-asserted-by":"crossref","unstructured":"Dodis Y, Haralambiev K, Lopez-Alt A, Wichs D (2010) Cryptography against continuous memory attacks. In: FOCS 2010, pp 511\u2013520","key":"2534_CR46","DOI":"10.1109\/FOCS.2010.56"},{"doi-asserted-by":"publisher","unstructured":"Shen J, Wang C, Li T, Chen X, Huang X, Zhan ZH (2018) Secure data uploading scheme for a smart home system. Inf Sci. \n                    https:\/\/doi.org\/10.1016\/j.ins.2018.04.048","key":"2534_CR47","DOI":"10.1016\/j.ins.2018.04.048"},{"issue":"10","key":"2534_CR48","doi-asserted-by":"publisher","first-page":"3184","DOI":"10.1109\/TC.2015.2512870","volume":"65","author":"X Chen","year":"2016","unstructured":"Chen X, Li J, Weng J, Ma J, Lou W (2016) Verifiable computation over large database with incremental updates. IEEE Trans Comput 65(10):3184\u20133195","journal-title":"IEEE Trans Comput"},{"doi-asserted-by":"crossref","unstructured":"Lewko A, Rouselakis Y, Waters B (2011) Achieving leakage resilience through dual system encryption. In: TCC 2011, pp 70\u201388","key":"2534_CR49","DOI":"10.1007\/978-3-642-19571-6_6"},{"doi-asserted-by":"crossref","unstructured":"Lewko A, Lewko M, Waters B (2011) How to leak on key updates. In: STOC 2011, pp 725\u2013734","key":"2534_CR50","DOI":"10.1145\/1993636.1993732"},{"doi-asserted-by":"crossref","unstructured":"Dodis Y, Lewko A, Waters B, Wichs D (2011) Storing secrets on continually leaky devices. In: FOCS 2011, pp 688\u2013697","key":"2534_CR51","DOI":"10.1109\/FOCS.2011.35"},{"doi-asserted-by":"crossref","unstructured":"Kalai Y, Kanukurthi B, Sahai A (2011) Cryptography with tamperable and leaky memory. In: Advances in Cryptology-CRYPTO 2011. Springer, pp 373\u2013390","key":"2534_CR52","DOI":"10.1007\/978-3-642-22792-9_21"},{"doi-asserted-by":"crossref","unstructured":"Damg\u00e5rd I, Faust S, Mukherjee P, Venturi D (2013) Bounded tamper resilience: How to go beyond the algebraic barrier. In: Advances in Cryptology-ASIACRYPT 2013. Springer, pp 140\u2013160","key":"2534_CR53","DOI":"10.1007\/978-3-642-42045-0_8"},{"issue":"6","key":"2534_CR54","doi-asserted-by":"publisher","first-page":"1615","DOI":"10.1109\/TPDS.2013.284","volume":"25","author":"J Li","year":"2014","unstructured":"Li J, Chen X, Li M, Li J, Lee PP, Lou W (2014) Secure deduplication with efficient and reliable convergent key management. IEEE Trans Parallel Distrib Syst 25(6):1615\u20131625","journal-title":"IEEE Trans Parallel Distrib Syst"},{"unstructured":"Wichs D (2011) Cryptographic resilience to continual information leakage. PhD thesis, New York University","key":"2534_CR55"},{"doi-asserted-by":"crossref","unstructured":"Naor M, Yung M (1990) Public-key cryptosystems provably secure against chosen ciphertext attacks. In: STOC 1990, pp 427\u2013437","key":"2534_CR56","DOI":"10.1145\/100216.100273"},{"doi-asserted-by":"crossref","unstructured":"Qin B, Liu S (2013) Leakage-resilient chosen-ciphertext secure public-key encryption from hash proof system and one-time lossy filter. In: Advances in Cryptology-ASIACRYPT 2013. Springer, pp 381\u2013400","key":"2534_CR57","DOI":"10.1007\/978-3-642-42045-0_20"},{"issue":"4","key":"2534_CR58","doi-asserted-by":"publisher","first-page":"772","DOI":"10.1137\/100813464","volume":"41","author":"M Naor","year":"2012","unstructured":"Naor M, Segev G (2012) Public-key cryptosystems resilient to key leakage. SIAM J Comput 41(4):772\u2013814","journal-title":"SIAM J Comput"},{"doi-asserted-by":"crossref","unstructured":"Cramer R, Shoup V (2002) Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption. In: Advances in Cryptology-EUROCRYPT 2002. Springer, pp 45\u201364","key":"2534_CR59","DOI":"10.1007\/3-540-46035-7_4"},{"doi-asserted-by":"crossref","unstructured":"Dodis Y, Kalai Y, Lovett S (2009) On cryptography with auxiliary input. In: STOC 2009, pp 621\u2013630","key":"2534_CR60","DOI":"10.1145\/1536414.1536498"},{"unstructured":"Chen J, Wei Lim H, Ling S, Wang H, Wee H (2012) Shorter ibe and signatures via asymmetric pairings. In: Pairing 2012, pp 122\u2013140","key":"2534_CR61"},{"doi-asserted-by":"crossref","unstructured":"Yang R, Xu Q, Zhou Y, Zhang R, Hu C, Yu Z (2015) Updatable hash proof system and its applications. In: ESORICS2015, pp 266\u2013285","key":"2534_CR62","DOI":"10.1007\/978-3-319-24174-6_14"},{"key":"2534_CR63","first-page":"332","volume":"2004","author":"V Shoup","year":"2004","unstructured":"Shoup V (2004) Sequences of games: a tool for taming complexity in security proofs. Cryptology ePrint Archive 2004:332","journal-title":"Cryptology ePrint Archive"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-018-2534-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-018-2534-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-018-2534-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,20]],"date-time":"2019-09-20T02:43:15Z","timestamp":1568947395000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-018-2534-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,23]]},"references-count":63,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2019,6]]}},"alternative-id":["2534"],"URL":"https:\/\/doi.org\/10.1007\/s11227-018-2534-z","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"type":"print","value":"0920-8542"},{"type":"electronic","value":"1573-0484"}],"subject":[],"published":{"date-parts":[[2018,8,23]]},"assertion":[{"value":"23 August 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}