{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T17:41:54Z","timestamp":1770831714951,"version":"3.50.1"},"reference-count":66,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2023,11,1]],"date-time":"2023-11-01T00:00:00Z","timestamp":1698796800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2023,11,1]],"date-time":"2023-11-01T00:00:00Z","timestamp":1698796800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2023,11,1]],"date-time":"2023-11-01T00:00:00Z","timestamp":1698796800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2023,11,1]],"date-time":"2023-11-01T00:00:00Z","timestamp":1698796800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2023,11,1]],"date-time":"2023-11-01T00:00:00Z","timestamp":1698796800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2023,11,1]],"date-time":"2023-11-01T00:00:00Z","timestamp":1698796800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,11,1]],"date-time":"2023-11-01T00:00:00Z","timestamp":1698796800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Communications"],"published-print":{"date-parts":[[2023,11]]},"DOI":"10.1016\/j.comcom.2023.09.021","type":"journal-article","created":{"date-parts":[[2023,9,21]],"date-time":"2023-09-21T23:59:04Z","timestamp":1695340744000},"page":"286-301","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":6,"special_numbering":"C","title":["Two protocols for improving security during the authentication and key agreement procedure in the 3GPP networks"],"prefix":"10.1016","volume":"211","author":[{"given":"M.M.","family":"Modiri","sequence":"first","affiliation":[]},{"given":"M.","family":"Salmasizadeh","sequence":"additional","affiliation":[]},{"given":"J.","family":"Mohajeri","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9289-2338","authenticated-orcid":false,"given":"B.H.","family":"Khalaj","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.comcom.2023.09.021_b1","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1016\/j.phycom.2015.10.006","article-title":"A survey on 5G: The next generation of mobile communication","volume":"18","author":"Panwar","year":"2016","journal-title":"Phys. Commun."},{"key":"10.1016\/j.comcom.2023.09.021_b2","doi-asserted-by":"crossref","first-page":"170","DOI":"10.1016\/j.comcom.2020.12.026","article-title":"5G heterogeneous network selection and resource allocation optimization based on cuckoo search algorithm","volume":"168","author":"Ai","year":"2021","journal-title":"Comput. Commun."},{"issue":"2","key":"10.1016\/j.comcom.2023.09.021_b3","first-page":"316","article-title":"6G and Internet of Things: A survey","volume":"8","author":"Kim","year":"2021","journal-title":"J. Manag. Anal."},{"issue":"1","key":"10.1016\/j.comcom.2023.09.021_b4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3437537","article-title":"Security and privacy requirements for the internet of things: A survey","volume":"2","author":"Alhirabi","year":"2021","journal-title":"ACM Trans. Internet Things"},{"key":"10.1016\/j.comcom.2023.09.021_b5","first-page":"1","article-title":"Design, developments, and applications of 5G antennas: A review","author":"Pant","year":"2022","journal-title":"Int. J. Microwave Wireless Technol."},{"key":"10.1016\/j.comcom.2023.09.021_b6","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1016\/j.comcom.2021.01.003","article-title":"Addressing disasters in smart cities through UAVs path planning and 5G communications: A systematic review","volume":"168","author":"Qadir","year":"2021","journal-title":"Comput. Commun."},{"key":"10.1016\/j.comcom.2023.09.021_b7","first-page":"1","article-title":"5G, 6G, and Beyond: Recent advances and future challenges","author":"Salahdine","year":"2023","journal-title":"Ann. Telecommun."},{"key":"10.1016\/j.comcom.2023.09.021_b8","unstructured":"3rd Generation partnership project; Technical specification group services and system aspects; Security architecture and procedures for 5G system (Release 15), document 3GPP TS 33.501 V.15.16.0, 3GPP, Jul 2022."},{"key":"10.1016\/j.comcom.2023.09.021_b9","unstructured":"3rd Generation partnership project;, Technical specification (TS); 5G System; Security assurance specification (SCAS) for the next generation Node B (gNodeB) network product class (Release 16), document 3GPP TS 33.511 V.16.9.0, 3GPP, Jan 2023."},{"key":"10.1016\/j.comcom.2023.09.021_b10","unstructured":"3rd Generation partnership project;, technical specification group core network and terminals; 5G System; access and mobility management services; Stage 3 (Release 17), document 3GPP TS 29.518 V.17.8.0, 3GPP, Feb 2023."},{"issue":"5","key":"10.1016\/j.comcom.2023.09.021_b11","doi-asserted-by":"crossref","first-page":"444","DOI":"10.1109\/JCN.2019.000048","article-title":"On the security aspects of Internet of Things: A systematic literature review","volume":"21","author":"Macedo","year":"2019","journal-title":"J. Commun. Netw."},{"key":"10.1016\/j.comcom.2023.09.021_b12","series-title":"Applied Information Processing Systems","first-page":"447","article-title":"A Survey on 5G Architecture and Security Scopes in SDN and NFV","author":"Hasneen","year":"2022"},{"issue":"5","key":"10.1016\/j.comcom.2023.09.021_b13","doi-asserted-by":"crossref","first-page":"421","DOI":"10.1049\/cmu2.12301","article-title":"A review on security threats, vulnerabilities, and counter measures of 5G enabled Internet-of-Medical-Things","volume":"16","author":"Ghazal","year":"2022","journal-title":"IET Commun."},{"key":"10.1016\/j.comcom.2023.09.021_b14","doi-asserted-by":"crossref","first-page":"56","DOI":"10.5195\/rt.2019.591","article-title":"Universal declaration of human rights","volume":"113","author":"Zandy","year":"2019","journal-title":"Radic. Teach."},{"key":"10.1016\/j.comcom.2023.09.021_b15","unstructured":"Universal Declaration of Human Rights, General Assembly resolution 217 A. 10 Dec 1948. [Online]. Available: https:\/\/www.un.org\/en\/about-us\/universal-declaration-of-human-rights."},{"key":"10.1016\/j.comcom.2023.09.021_b16","unstructured":"3GPP privacy policy. Last modified in May 2019, Available: https:\/\/www.3gpp.org\/news-events\/."},{"key":"10.1016\/j.comcom.2023.09.021_b17","doi-asserted-by":"crossref","first-page":"87552","DOI":"10.1109\/ACCESS.2020.2992649","article-title":"BDSS-FA: A blockchain-based data security sharing platform with fine-grained access control","volume":"8","author":"Xu","year":"2020","journal-title":"IEEE Access"},{"issue":"5","key":"10.1016\/j.comcom.2023.09.021_b18","doi-asserted-by":"crossref","first-page":"384","DOI":"10.1049\/cmu2.12327","article-title":"A comprehensive review on the users\u2019 identity privacy for 5G networks","volume":"16","author":"Saeed","year":"2022","journal-title":"IET Commun."},{"key":"10.1016\/j.comcom.2023.09.021_b19","doi-asserted-by":"crossref","DOI":"10.1016\/j.scs.2019.101660","article-title":"A survey on cybersecurity, data privacy, and policy issues in cyber-physical system deployments in smart cities","volume":"50","author":"Habibzadeh","year":"2019","journal-title":"Sustainable Cities Soc."},{"key":"10.1016\/j.comcom.2023.09.021_b20","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2019.106871","article-title":"Towards secure 5G networks: A Survey","volume":"162","author":"Zhang","year":"2019","journal-title":"Comput. Netw."},{"issue":"1","key":"10.1016\/j.comcom.2023.09.021_b21","doi-asserted-by":"crossref","first-page":"1","DOI":"10.32604\/csse.2021.015593","article-title":"Pseudonym mutable based privacy for 5G user identity","volume":"39","author":"Saeed","year":"2021","journal-title":"Comput. Syst. Sci. Eng."},{"issue":"3","key":"10.1016\/j.comcom.2023.09.021_b22","article-title":"A comprehensive survey on core technologies and services for 5G security: Taxonomies, issues, and solutions","volume":"11","author":"Park","year":"2021","journal-title":"Hum.-Centric Comput. Inf. Sci"},{"key":"10.1016\/j.comcom.2023.09.021_b23","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1016\/j.jnca.2017.10.017","article-title":"Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes","volume":"101","author":"Ferrag","year":"2018","journal-title":"J. Netw. Comput. Appl."},{"issue":"4","key":"10.1016\/j.comcom.2023.09.021_b24","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2981547","article-title":"Authentication protocol for an IoT-enabled LTE network","volume":"16","author":"Saxena","year":"2016","journal-title":"ACM Trans. Internet Technol."},{"key":"10.1016\/j.comcom.2023.09.021_b25","doi-asserted-by":"crossref","first-page":"1094","DOI":"10.1109\/OJCOMS.2021.3078081","article-title":"The roadmap to 6G security and privacy","volume":"2","author":"Porambage","year":"2021","journal-title":"IEEE Open J. Commun. Soc."},{"key":"10.1016\/j.comcom.2023.09.021_b26","series-title":"2021 Joint European Conference on Networks and Communications & 6G Summit","first-page":"616","article-title":"AI and 6G security: Opportunities and challenges","author":"Siriwardhana","year":"2021"},{"issue":"5","key":"10.1016\/j.comcom.2023.09.021_b27","doi-asserted-by":"crossref","first-page":"1969","DOI":"10.3390\/s22051969","article-title":"Security requirements and challenges of 6G technologies and applications","volume":"22","author":"Abdel Hakeem","year":"2022","journal-title":"Sensors"},{"issue":"5","key":"10.1016\/j.comcom.2023.09.021_b28","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1049\/ecej:20020502","article-title":"UMTS security","volume":"14","author":"Boman","year":"2002","journal-title":"Electron. Commun. Eng. J."},{"issue":"9","key":"10.1016\/j.comcom.2023.09.021_b29","doi-asserted-by":"crossref","first-page":"4509","DOI":"10.1109\/TVT.2011.2168247","article-title":"S-AKA: A provable and secure authentication key agreement protocol for UMTS networks","volume":"60","author":"Huang","year":"2011","journal-title":"IEEE Trans. Veh. Technol."},{"key":"10.1016\/j.comcom.2023.09.021_b30","unstructured":"3rd Generation partnership project; Technical specification group services and system aspects; Security architecture and procedures for 5G system (Release 16), document 3GPP TS 33.501 V.16.13.0, 3GPP, Jan 2023."},{"key":"10.1016\/j.comcom.2023.09.021_b31","unstructured":"3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Security architecture and procedures for 5G system (Release 17), document 3GPP TS 33.501 V.17.8.0, 3GPP, Jan 2023."},{"key":"10.1016\/j.comcom.2023.09.021_b32","series-title":"International Conference on Applied Cryptography and Network Security","first-page":"18","article-title":"A cryptographic analysis of UMTS\/LTE aka","author":"Alt","year":"2016"},{"key":"10.1016\/j.comcom.2023.09.021_b33","series-title":"2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications","first-page":"949","article-title":"Enhancing user identity privacy in LTE","author":"Choudhury","year":"2012"},{"issue":"2","key":"10.1016\/j.comcom.2023.09.021_b34","doi-asserted-by":"crossref","first-page":"316","DOI":"10.1016\/j.jss.2009.08.019","article-title":"A cocktail protocol with the authentication and key agreement on the UMTS","volume":"83","author":"Ou","year":"2010","journal-title":"J. Syst. Softw."},{"issue":"1","key":"10.1016\/j.comcom.2023.09.021_b35","first-page":"33","article-title":"Efficient data memory usages of 3GPP authentication and key agreement protocol","volume":"8","author":"Park","year":"2014","journal-title":"Int. J. Secur. Appl."},{"issue":"3","key":"10.1016\/j.comcom.2023.09.021_b36","doi-asserted-by":"crossref","first-page":"1981","DOI":"10.1007\/s11277-015-2551-7","article-title":"ES-AKA: An efficient and secure authentication and key agreement protocol for UMTS networks","volume":"84","author":"Saxena","year":"2015","journal-title":"Wirel. Pers. Commun."},{"key":"10.1016\/j.comcom.2023.09.021_b37","doi-asserted-by":"crossref","unstructured":"Balu Parne, Shubham Gupta, Narendra Chaudhari, SEACE: Security enhanced and computationally efficient AKA protocol for UMTS networks, in: 2018 4th International Conference on Recent Advances in Information Technology, RAIT, 2018, pp. 1\u20137.","DOI":"10.1109\/RAIT.2018.8389062"},{"key":"10.1016\/j.comcom.2023.09.021_b38","unstructured":"3rd Generation partnership project; Technical specification group services and system aspects; 3GPP system architecture evolution (SAE); security architecture, document 3GPP TS 33.401 V.17.3.1, 3GPP, Sep 2022."},{"issue":"9","key":"10.1016\/j.comcom.2023.09.021_b39","doi-asserted-by":"crossref","first-page":"593","DOI":"10.1007\/s12243-019-00721-x","article-title":"A survey on authentication and access control for mobile networks: from 4G to 5G","volume":"74","author":"Behrad","year":"2019","journal-title":"Ann. Telecommun."},{"key":"10.1016\/j.comcom.2023.09.021_b40","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1016\/j.comnet.2015.11.014","article-title":"Performance and security enhanced authentication and key agreement protocol for SAE\/LTE network","volume":"94","author":"Degefa","year":"2016","journal-title":"Comput. Netw."},{"key":"10.1016\/j.comcom.2023.09.021_b41","article-title":"Enhanced authentication and key agreement procedure of next generation 3GPP mobile networks","author":"Purkhiabani","year":"2012","journal-title":"Int. J. Inf. Electron. Eng."},{"key":"10.1016\/j.comcom.2023.09.021_b42","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1016\/j.comcom.2016.09.009","article-title":"A privacy-enhanced computationally-efficient and comprehensive LTE-AKA","volume":"98","author":"Hamandi","year":"2017","journal-title":"Comput. Commun."},{"key":"10.1016\/j.comcom.2023.09.021_b43","doi-asserted-by":"crossref","unstructured":"N.S.C.S. Gupta, B.L. Parne, A generic construction for efficient and secure AKA protocol in 5G network, in: Proc. IEEE Int. Conf. Adv. Netw. Telecommun. Syst., ANTS, 2018, pp. 1\u20136.","DOI":"10.1109\/ANTS.2018.8710157"},{"key":"10.1016\/j.comcom.2023.09.021_b44","series-title":"2020 Seventh International Conference on Software Defined Systems","first-page":"256","article-title":"Formal verification and analysis of primary authentication based on 5G-AKA protocol","author":"Edris","year":"2020"},{"issue":"5","key":"10.1016\/j.comcom.2023.09.021_b45","doi-asserted-by":"crossref","first-page":"257","DOI":"10.3390\/info13050257","article-title":"5GAKA-LCCO: A secure 5G authentication and key agreement protocol with less communication and computation overhead","volume":"13","author":"Xiao","year":"2022","journal-title":"Information"},{"key":"10.1016\/j.comcom.2023.09.021_b46","doi-asserted-by":"crossref","unstructured":"David Basin, Jannik Dreier, Lucca Hirschi, Sa\u0161a Radomirovic, Ralf Sasse, Vincent Stettler, A formal analysis of 5G authentication, in: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018, pp. 1383\u20131396.","DOI":"10.1145\/3243734.3243846"},{"key":"10.1016\/j.comcom.2023.09.021_b47","series-title":"Security Vulnerability in 5G-AKA draft","first-page":"14","author":"Dehnel-Wild","year":"2018"},{"key":"10.1016\/j.comcom.2023.09.021_b48","series-title":"2019 IEEE European Symposium on Security and Privacy","first-page":"464","article-title":"The 5G-AKA authentication protocol privacy","author":"Koutsos","year":"2019"},{"key":"10.1016\/j.comcom.2023.09.021_b49","article-title":"Component-based formal analysis of 5G-AKA: Channel assumptions and session confusion","author":"Cremers","year":"2019","journal-title":"Internet Soc."},{"issue":"3","key":"10.1016\/j.comcom.2023.09.021_b50","doi-asserted-by":"crossref","first-page":"108","DOI":"10.2478\/popets-2019-0039","article-title":"New privacy threat on 3G, 4G, and upcoming 5G AKA protocols","volume":"2019","author":"Borgaonkar","year":"2019","journal-title":"Proc. Privacy Enhancing Technol."},{"issue":"3","key":"10.1016\/j.comcom.2023.09.021_b51","doi-asserted-by":"crossref","first-page":"711","DOI":"10.1587\/transinf.2019EDL8190","article-title":"A security enhanced 5G authentication scheme for insecure channel","volume":"103","author":"Hu","year":"2020","journal-title":"IEICE Trans. Inf. Syst."},{"issue":"8","key":"10.1016\/j.comcom.2023.09.021_b52","doi-asserted-by":"crossref","first-page":"1806","DOI":"10.1587\/transinf.2019FOL0001","article-title":"A vulnerability in 5G authentication protocols and its Countermeasure","volume":"103","author":"Hu","year":"2020","journal-title":"IEICE Trans. Inf. Syst."},{"key":"10.1016\/j.comcom.2023.09.021_b53","doi-asserted-by":"crossref","unstructured":"Mariya Ouaissa, Mariyam Ouaissa, An improved privacy authentication protocol for 5G mobile networks, in: 2020 International Conference on Advances in Computing, Communication and Materials, ICACCM, 2021, pp. 136\u2013143.","DOI":"10.1109\/ICACCM50413.2020.9212910"},{"key":"10.1016\/j.comcom.2023.09.021_b54","doi-asserted-by":"crossref","DOI":"10.1016\/j.jnca.2022.103435","article-title":"FastHand: A fast handover authentication protocol for densely deployed small-cell networks","author":"Roy","year":"2022","journal-title":"J. Netw. Comput. Appl."},{"issue":"3","key":"10.1016\/j.comcom.2023.09.021_b55","doi-asserted-by":"crossref","first-page":"125","DOI":"10.3390\/info13030125","article-title":"5G-IPAKA: An improved primary authentication and key agreement protocol for 5G networks","volume":"13","author":"Xiao","year":"2022","journal-title":"Information"},{"key":"10.1016\/j.comcom.2023.09.021_b56","unstructured":"Victor Fajardo, Jari Arkko, John Loughney, Glen Zorn, Diameter Base Protocol, Technical Report, 2012."},{"key":"10.1016\/j.comcom.2023.09.021_b57","series-title":"Advanced encryption standard (AES)","author":"Dworkin","year":"2001"},{"key":"10.1016\/j.comcom.2023.09.021_b58","series-title":"Introduction to Modern Cryptography","author":"Katz","year":"2021"},{"key":"10.1016\/j.comcom.2023.09.021_b59","first-page":"1","article-title":"On the secure hash algorithm family","author":"Penard","year":"2008","journal-title":"Cryptogr. Context"},{"issue":"4","key":"10.1016\/j.comcom.2023.09.021_b60","doi-asserted-by":"crossref","first-page":"2925","DOI":"10.1007\/s11277-021-09036-4","article-title":"SEAI: Secrecy and Efficiency Aware Inter-gNB Handover Authentication and Key Agreement Protocol in 5G Communication Network","volume":"122","author":"Gupta","year":"2022","journal-title":"Wirel. Pers. Commun."},{"key":"10.1016\/j.comcom.2023.09.021_b61","series-title":"Introduction to pattern recognition and machine learning 5","author":"Murty","year":"2015"},{"issue":"1","key":"10.1016\/j.comcom.2023.09.021_b62","doi-asserted-by":"crossref","first-page":"39","DOI":"10.3390\/network3010003","article-title":"On Attacking Future 5G Networks with Adversarial Examples: Survey","volume":"3","author":"Zolotukhin","year":"2023","journal-title":"Network"},{"issue":"4","key":"10.1016\/j.comcom.2023.09.021_b63","doi-asserted-by":"crossref","first-page":"38","DOI":"10.3390\/cryptography5040038","article-title":"Post-quantum and code-based cryptography\u2014Some prospective research directions","volume":"5","author":"Balamurugan","year":"2021","journal-title":"Cryptography"},{"issue":"4","key":"10.1016\/j.comcom.2023.09.021_b64","doi-asserted-by":"crossref","first-page":"37","DOI":"10.15864\/ijiip.2405","article-title":"Quantum computing and post quantum cryptography","volume":"2","author":"Kumar","year":"2021","journal-title":"Int. J. Innov. Res. Phys."},{"key":"10.1016\/j.comcom.2023.09.021_b65","series-title":"Analysis of ECIES and other cryptosystems based on elliptic curves","author":"Gayoso Mart\u00ednez","year":"2011"},{"key":"10.1016\/j.comcom.2023.09.021_b66","article-title":"Security and privacy vulnerabilities of 5G\/6G and WiFi 6: Survey and research directions from a coexistence perspective","author":"Ramezanpour","year":"2022","journal-title":"Comput. Netw."}],"container-title":["Computer Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366423003316?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366423003316?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T23:44:58Z","timestamp":1758843898000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0140366423003316"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11]]},"references-count":66,"alternative-id":["S0140366423003316"],"URL":"https:\/\/doi.org\/10.1016\/j.comcom.2023.09.021","relation":{},"ISSN":["0140-3664"],"issn-type":[{"value":"0140-3664","type":"print"}],"subject":[],"published":{"date-parts":[[2023,11]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Two protocols for improving security during the authentication and key agreement procedure in the 3GPP networks","name":"articletitle","label":"Article Title"},{"value":"Computer Communications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.comcom.2023.09.021","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2023 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}]}}