{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:44:22Z","timestamp":1740123862830,"version":"3.37.3"},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2021,1,5]],"date-time":"2021-01-05T00:00:00Z","timestamp":1609804800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,5]],"date-time":"2021-01-05T00:00:00Z","timestamp":1609804800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["No.61602097","No.61502087","No.61472064"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2021,2]]},"DOI":"10.1007\/s11276-020-02524-8","type":"journal-article","created":{"date-parts":[[2021,1,5]],"date-time":"2021-01-05T01:03:01Z","timestamp":1609808581000},"page":"1477-1490","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Anonymising group data sharing in opportunistic mobile social networks"],"prefix":"10.1007","volume":"27","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3164-0409","authenticated-orcid":false,"given":"Daniel","family":"Adu-Gyamfi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2300-8817","authenticated-orcid":false,"given":"Fengli","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Augustine","family":"Takyi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,5]]},"reference":[{"key":"2524_CR1","volume-title":"Active media technology. AMT 2011. Lecture notes in computer science (6890)","author":"J Niu","year":"2011","unstructured":"Niu, J., Dai, B., & Guo, J. (2011). A novel data collection scheme based on active degree for OMSN. In N. Zhong, V. Callaghan, A. A. Ghorbani, & B. Hu (Eds.), Active media technology. AMT 2011. Lecture notes in computer science (6890). Berlin: Springer."},{"issue":"3","key":"2524_CR2","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TMC.2012.252","volume":"13","author":"B Alomair","year":"2014","unstructured":"Alomair, B., & Poovendran, R. (2014). Efficient authentication for mobile and pervasive computing. IEEE Transactions on Mobile Computing, 13(3), 469\u2013481.","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"4","key":"2524_CR3","doi-asserted-by":"publisher","first-page":"912","DOI":"10.1109\/TIFS.2017.2774439","volume":"13","author":"J Shen","year":"2017","unstructured":"Shen, J., Zhou, T., Chen, X., Li, J., & Susilo, W. (2017). Anonymous and traceable group data sharing in cloud computing. IEEE Transactions on Information Forensics and Security, 13(4), 912\u2013925.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"2524_CR4","unstructured":"Biryukov, A., & Perrin, L. (2017). State of the art in lightweight symmetric cryptography. https:\/\/eprint.iacr.org\/2017\/511.pdf. Accessed 21 Sept 2020."},{"key":"2524_CR5","doi-asserted-by":"publisher","unstructured":"McKay, K.A., Bassham, L.E., Turan, M., & Mouha, N. (2017). Report on lightweight cryptography. National Institute of Standards and Technology Internal Report 8114. https:\/\/doi.org\/https:\/\/doi.org\/10.6028\/NIST.IR.8114.","DOI":"10.6028\/NIST.IR.8114"},{"key":"2524_CR6","doi-asserted-by":"publisher","first-page":"1607","DOI":"10.1007\/s11277-014-2102-7","volume":"80","author":"Y Wang","year":"2015","unstructured":"Wang, Y., Chen, I., & Wang, D. A. (2015). Survey of mobile cloud computing applications: Perspectives and challenges. Wireless Personal Communication, 80, 1607\u20131623.","journal-title":"Wireless Personal Communication"},{"key":"2524_CR7","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/7254305","author":"R Xie","year":"2018","unstructured":"Xie, R., He, C., Xie, D., Gao, C., & Zhang, X. (2018). A secure ciphertext retrieval scheme against insider KGAs for mobile devices in cloud storage. Security and Communication Networks. https:\/\/doi.org\/10.1155\/2018\/7254305.","journal-title":"Security and Communication Networks"},{"key":"2524_CR8","doi-asserted-by":"crossref","unstructured":"Greitzer, F. L., Strozer, J. R., Cohen, S., Moore, A. P., Mundie, D. & Cowley, J. (2014). Analysis of unintentional insider threats deriving from social engineering exploits. In 2014 IEEE security and privacy workshops (pp. 236\u2013250). IEEE.","DOI":"10.1109\/SPW.2014.39"},{"key":"2524_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.12.013","author":"M Edwards","year":"2017","unstructured":"Edwards, M., Larson, R., Green, B., Rashid, A., & Baron, A. (2017). Panning for gold: Automatically analysing online social engineering attack surfaces. Computers & Security. https:\/\/doi.org\/10.1016\/j.cose.2016.12.013.","journal-title":"Computers & Security"},{"key":"2524_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-803843-7.00052-1","author":"C Braghin","year":"2017","unstructured":"Braghin, C., & Cremonini, M. (2017). Online privacy. Computer and Information Security Handbook (Third Edition). https:\/\/doi.org\/10.1016\/B978-0-12-803843-7.00052-1.","journal-title":"Computer and Information Security Handbook (Third Edition)"},{"key":"2524_CR11","doi-asserted-by":"publisher","first-page":"4247","DOI":"10.1007\/s11276-019-02087-3","volume":"25","author":"H Ling","year":"2019","unstructured":"Ling, H., & Yang, S. (2019). Passive neighbor discovery with social recognition for mobile ad hoc social networking applications. Wireless Networks, 25, 4247\u20134258.","journal-title":"Wireless Networks"},{"key":"2524_CR12","doi-asserted-by":"publisher","first-page":"1295","DOI":"10.1007\/s11276-013-0677-7","volume":"20","author":"Y Wang","year":"2014","unstructured":"Wang, Y., Vasilakos, A. V., Jin, Q., et al. (2014). Survey on mobile social networking in proximity (MSNP): Approaches, challenges and architecture. Wireless Networks, 20, 1295\u20131311.","journal-title":"Wireless Networks"},{"key":"2524_CR13","doi-asserted-by":"publisher","first-page":"2283","DOI":"10.1007\/s11276-017-1469-2","volume":"24","author":"H Ahmad","year":"2018","unstructured":"Ahmad, H., Agiwal, M., Saxena, N., et al. (2018). D2D-based survival on sharing for critical communications. Wireless Networks, 24, 2283\u20132295.","journal-title":"Wireless Networks"},{"issue":"3","key":"2524_CR14","doi-asserted-by":"publisher","first-page":"2220","DOI":"10.1109\/COMST.2016.2544751","volume":"8","author":"G Han","year":"2016","unstructured":"Han, G., Jiang, J., Zhang, C., Duong, T. Q., Guizani, M., & Karagiannidis, G. K. (2016). A survey on mobile anchor node assisted localization in wireless sensor networks. IEEE Communications Surveys & Tutorials, 8(3), 2220\u20132243.","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"4","key":"2524_CR15","doi-asserted-by":"publisher","first-page":"1163","DOI":"10.1007\/s11276-014-0842-7","volume":"21","author":"F De Rango","year":"2015","unstructured":"De Rango, F., Socievole, A., & Marano, S. (2015). Exploiting online and offline activity-based metrics for opportunistic forwarding. Wireless Networks, 21(4), 1163\u20131179.","journal-title":"Wireless Networks"},{"key":"2524_CR16","doi-asserted-by":"crossref","unstructured":"Arapinis, M., Mancini, L., Ritter, E., et al. (2012). New privacy issues in mobile telephony: Fix and verification. In Proceedings of the 2012 ACM conference on computer and communications security (pp. 205\u2013216). ACM.","DOI":"10.1145\/2382196.2382221"},{"key":"2524_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.10.022","author":"S Zakhary","year":"2018","unstructured":"Zakhary, S., & Benslimane, A. (2018). On location-privacy in opportunistic mobile networks, a survey. Journal of Network and Computer Applications. https:\/\/doi.org\/10.1016\/j.jnca.2017.10.022.","journal-title":"Journal of Network and Computer Applications"},{"issue":"4","key":"2524_CR18","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1049\/iet-ifs.2018.5103","volume":"13","author":"M Ouladj","year":"2019","unstructured":"Ouladj, M., Guillot, P., & Mokrane, F. (2019). Chosen message strategy to improve the correlation power analysis. IET Information Security, 13(4), 304\u2013310.","journal-title":"IET Information Security"},{"key":"2524_CR19","doi-asserted-by":"crossref","unstructured":"Jiang, W., Chen, J. & Feng, Q. (2017). A trusted service selection method based on user's personality feature and service recommendation. In 14th web information systems and applications conference (WISA) (pp. 267\u2013272). IEEE.","DOI":"10.1109\/WISA.2017.55"},{"issue":"6","key":"2524_CR20","doi-asserted-by":"publisher","first-page":"1278","DOI":"10.1109\/TIFS.2016.2524514","volume":"11","author":"X Wu","year":"2016","unstructured":"Wu, X., Yang, Z., Ling, C., & Xia, X. (2016). Artificial-noise-aided message authentication codes with information-theoretic security. IEEE Transactions on Information Forensics and Security, 11(6), 1278\u20131290.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"2524_CR21","doi-asserted-by":"crossref","unstructured":"Li, H., Chen, Y., Cheng, X., Li, K., & Chen, D. (2014). Secure friend discovery based on encounter history in mobile social networks. In 2014 international conference on identification, information and knowledge in the internet of things (pp. 280\u2013285). IEEE.","DOI":"10.1109\/IIKI.2014.64"},{"key":"2524_CR22","doi-asserted-by":"crossref","unstructured":"Arapinis, M., Chothia, T., Ritter, E., & Ryan, M. (2010). Analysing unlinkability and anonymity using the applied pi calculus. In 2010 23rd IEEE computer security foundations symposium (pp. 107\u2013121). IEEE.","DOI":"10.1109\/CSF.2010.15"},{"key":"2524_CR23","doi-asserted-by":"crossref","unstructured":"Carver, C., & Lin, X. (2012). A privacy-preserving proximity friend notification scheme with opportunistic networking. In 2012 IEEE international conference on communications (ICC) (pp. 5387\u20135392). IEEE.","DOI":"10.1109\/ICC.2012.6364252"},{"issue":"9","key":"2524_CR24","doi-asserted-by":"publisher","first-page":"8047","DOI":"10.1109\/TVT.2017.2683493","volume":"66","author":"C Lin","year":"2017","unstructured":"Lin, C., Han, D., Deng, J., & Wu, G. (2017). P2S: A primary and passer-by scheduling algorithm for on-demand charging architecture in wireless rechargeable sensor networks. IEEE Transactions on Vehicular Technology, 66(9), 8047\u20138058.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"2524_CR25","doi-asserted-by":"crossref","unstructured":"Saikia, P., Cheung, M., She, J., & Park, S. (2017). Effectiveness of mobile notification delivery. In 2017 18th IEEE international conference on mobile data management (MDM) (pp. 21\u201329). IEEE.","DOI":"10.1109\/MDM.2017.14"},{"key":"2524_CR26","doi-asserted-by":"publisher","first-page":"2403","DOI":"10.1007\/s11276-015-1105-y","volume":"22","author":"N Derakhshanfard","year":"2016","unstructured":"Derakhshanfard, N., Sabaei, M., & Rahmani, A. M. (2016). Sharing spray and wait routing algorithm in opportunistic networks. Wireless Networks, 22, 2403\u20132414.","journal-title":"Wireless Networks"},{"key":"2524_CR27","doi-asserted-by":"publisher","first-page":"559","DOI":"10.1007\/s11276-017-1575-1","volume":"25","author":"M Salehi","year":"2019","unstructured":"Salehi, M., & Boukerche, A. (2019). Secure opportunistic routing protocols: Methods, models, and classification. Wireless Networks, 25, 559\u2013571.","journal-title":"Wireless Networks"},{"key":"2524_CR28","doi-asserted-by":"publisher","first-page":"3103","DOI":"10.1007\/s11276-018-1705-4","volume":"25","author":"J Li","year":"2019","unstructured":"Li, J., Jia, X., Lv, X., Han, Z., & Liu, J. (2019). Opportunistic routing with data fusion for multi-source wireless sensor networks. Wireless Networks, 25, 3103\u20133113.","journal-title":"Wireless Networks"},{"issue":"3","key":"2524_CR29","doi-asserted-by":"publisher","first-page":"1282","DOI":"10.1109\/TVT.2013.2282341","volume":"63","author":"X Fan","year":"2014","unstructured":"Fan, X., Li, V. O. K., & Xu, K. (2014). Fairness analysis of routing in opportunistic mobile networks. IEEE Transactions on Vehicular Technology, 63(3), 1282\u20131295.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"2524_CR30","doi-asserted-by":"crossref","unstructured":"Fan, X., Xu, K. & Li, V. O. K. (2011). Fair packet forwarding in opportunistic networks. In 2011 IEEE 73rd vehicular technology conference (VTC Spring) (pp. 1\u20135). IEEE.","DOI":"10.1109\/VETECS.2011.5956361"},{"issue":"8","key":"2524_CR31","doi-asserted-by":"publisher","first-page":"2977","DOI":"10.1007\/s11276-018-1691-6","volume":"25","author":"J Wu","year":"2019","unstructured":"Wu, J., Chen, Z., & Zhao, M. (2019). Information cache management and data transmission algorithm in opportunistic social networks. Wireless Networks, 25(8), 2977\u20132988.","journal-title":"Wireless Networks"},{"key":"2524_CR32","doi-asserted-by":"publisher","first-page":"1839","DOI":"10.1007\/s11276-013-0577-x","volume":"19","author":"S Chiou","year":"2013","unstructured":"Chiou, S., & Huang, Y. (2013). Mobile common friends discovery with friendship ownership and replay-attack resistance. Wireless Networks, 19, 1839\u20131850.","journal-title":"Wireless Networks"},{"key":"2524_CR33","doi-asserted-by":"crossref","unstructured":"Zhuo, G., & Yang, H. (2018). Privacy-preserving context-aware friend discovery based on mobile sensing. In 2018 IEEE international conference on consumer electronics (ICCE) (pp. 1\u20135). IEEE.","DOI":"10.1109\/ICCE.2018.8326325"},{"key":"2524_CR34","volume-title":"Privacy enhancing technologies PET 2005. Lecture notes in computer science (3856)","author":"GM K\u00f8ien","year":"2006","unstructured":"K\u00f8ien, G. M., & Oleshchuk, V. A. (2006). Location privacy for cellular systems; analysis and solution. In G. Danezis & D. Martin (Eds.), Privacy enhancing technologies PET 2005. Lecture notes in computer science (3856). Berlin: Springer."},{"key":"2524_CR35","doi-asserted-by":"crossref","unstructured":"Tegos, S., Demetriadis, S., & Tsiatsos, T. (2012). Using a conversational agent for promoting collaborative language learning. In 2012 fourth international conference on intelligent networking and collaborative systems (pp. 162\u2013165). IEEE.","DOI":"10.1109\/iNCoS.2012.105"},{"issue":"3","key":"2524_CR36","doi-asserted-by":"publisher","first-page":"614","DOI":"10.1109\/TPDS.2012.146","volume":"24","author":"R Lu","year":"2013","unstructured":"Lu, R., Lin, X., & Shen, X. (2013). SPOC: A secure and privacy-preserving opportunistic computing framework for mobile-healthcare emergency. IEEE Transactions on Parallel and Distributed Systems, 24(3), 614\u2013624.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"2524_CR37","volume-title":"Topics in cryptology\u2014CT-RSA 2006. Lecture notes in computer science (3860)","author":"D Boneh","year":"2006","unstructured":"Boneh, D., Boyen, X., & Halevi, S. (2006). Chosen ciphertext secure public key threshold encryption without random oracles. In D. Pointcheval (Ed.), Topics in cryptology\u2014CT-RSA 2006. Lecture notes in computer science (3860). Berlin: Springer."},{"key":"2524_CR38","doi-asserted-by":"crossref","unstructured":"Hu, X., Wang, T. & Xu, H. (2010). Cryptanalysis and improvement of a HIBE and HIBS without random oracles. In 2010 international conference on machine vision and human\u2013machine interface (pp. 389\u2013392). IEEE.","DOI":"10.1109\/MVHI.2010.22"},{"issue":"5","key":"2524_CR39","doi-asserted-by":"publisher","first-page":"784","DOI":"10.1109\/TDSC.2016.2631533","volume":"15","author":"Q Tang","year":"2018","unstructured":"Tang, Q., & Wang, J. (2018). Privacy-preserving friendship-based recommender systems. IEEE Transactions on Dependable and Secure Computing, 15(5), 784\u2013796.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"1","key":"2524_CR40","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1109\/JSAC.2014.2369591","volume":"33","author":"KW Choi","year":"2015","unstructured":"Choi, K. W., & Han, Z. (2015). Device-to-device discovery for proximity-based service in LTE-advanced system. IEEE Journal on Selected Areas in Communications, 33(1), 55\u201366.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"2524_CR41","doi-asserted-by":"crossref","unstructured":"Yang, X., Shen, Z., Hu, X., & Hu, W. (2016). Physical layer encryption algorithm for chaotic optical OFDM transmission against chosen-plaintext attacks. In 2016 18th international conference on transparent optical networks (ICTON) (pp. 1\u20135). IEEE.","DOI":"10.1109\/ICTON.2016.7550597"},{"issue":"12","key":"2524_CR42","doi-asserted-by":"publisher","first-page":"2606","DOI":"10.1109\/LCOMM.2017.2747512","volume":"21","author":"YM Al-Moliki","year":"2017","unstructured":"Al-Moliki, Y. M., Alresheedi, M. T., & Al-Harthi, Y. (2017). Physical-layer security against known\/chosen plaintext attacks for OFDM-based VLC system. IEEE Communications Letters, 21(12), 2606\u20132609.","journal-title":"IEEE Communications Letters"},{"key":"2524_CR43","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1007\/s00145-011-9114-1","volume":"26","author":"E Fujisaki","year":"2013","unstructured":"Fujisaki, E., & Okamoto, T. (2013). Secure integration of asymmetric and symmetric encryption schemes. Journal of Cryptology, 26, 80\u2013101.","journal-title":"Journal of Cryptology"},{"issue":"4","key":"2524_CR44","doi-asserted-by":"publisher","first-page":"1041","DOI":"10.1109\/TCC.2016.2541138","volume":"6","author":"Y Tseng","year":"2018","unstructured":"Tseng, Y., Tsai, T., Huang, S., & Huang, C. (2018). Identity-based encryption with cloud revocation authority and its applications. IEEE Transactions on Cloud Computing, 6(4), 1041\u20131053.","journal-title":"IEEE Transactions on Cloud Computing"},{"key":"2524_CR45","volume-title":"Advances in cryptology, lecture notes in computer science","author":"D Boneh","year":"2001","unstructured":"Boneh, D., Lynn, B., & Shacham, H. (2001). Short signatures from the Weil pairing. In C. Boyd (Ed.), Advances in cryptology, lecture notes in computer science. Berlin: Springer."},{"key":"2524_CR46","doi-asserted-by":"crossref","unstructured":"Kobeissi, N., Bhargavan, K., & Blanchet, B. (2017). Automated verification for secure messaging protocols and their implementations: A symbolic and computational approach. In 2017 IEEE European symposium on security and privacy (EuroS&P) (pp. 435\u2013450). IEEE.","DOI":"10.1109\/EuroSP.2017.38"},{"key":"2524_CR47","volume-title":"Foundations of security analysis and design VII. FOSAD 2013, FOSAD 2012. Lecture notes in computer science (8604)","author":"B Blanchet","year":"2014","unstructured":"Blanchet, B. (2014). Automatic verification of security protocols in the symbolic model: The verifier ProVerif. In A. Aldini, J. Lopez, & F. Martinelli (Eds.), Foundations of security analysis and design VII. FOSAD 2013, FOSAD 2012. Lecture notes in computer science (8604). Cham: Springer."},{"key":"2524_CR48","doi-asserted-by":"crossref","unstructured":"Kim, Y., & Kim, G. (2018). A Performance analysis of lightweight cryptography algorithm for data privacy in IoT devices. In 2018 international conference on information and communication technology convergence (ICTC) (pp. 936\u2013938). IEEE.","DOI":"10.1109\/ICTC.2018.8539592"},{"key":"2524_CR49","doi-asserted-by":"crossref","unstructured":"Vodel, M., Caspar, M. & Hardt, W. (2010). A capable, lightweight communication concept by combining ambient network approaches with cognitive radio aspects. In 2010 17th international conference on telecommunications (pp. 430\u2013434). IEEE.","DOI":"10.1109\/ICTEL.2010.5478784"},{"key":"2524_CR50","unstructured":"Katagi, M. & Moriai, S. (2011). Lightweight cryptography for the internet of things. Available: https:\/\/www.iab.org\/wpcontent\/IAB-uploads\/2011\/03\/Kaftan.pdf. Accessed 21 Sept 2020."},{"issue":"3","key":"2524_CR51","doi-asserted-by":"publisher","first-page":"956","DOI":"10.1016\/j.future.2016.11.033","volume":"78","author":"J Shen","year":"2018","unstructured":"Shen, J., Chang, S., Shen, J., Liu, Q., & Sun, X. (2018). A lightweight multi-layer authentication protocol for wireless body area networks. Future Generation Computer Systems, 78(3), 956\u2013963.","journal-title":"Future Generation Computer Systems"},{"key":"2524_CR52","doi-asserted-by":"crossref","unstructured":"Gao, W., Li, Q., Zhao, B., & Cao, G. (2009). Multicasting in delay tolerant networks: A social network perspective. In Proceedings of the 10th ACM international symposium on mobile ad hoc networking and computing (MobiHoc) (pp. 299\u2013308). ACM.","DOI":"10.1145\/1530748.1530790"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-020-02524-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11276-020-02524-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-020-02524-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,10]],"date-time":"2022-12-10T14:03:15Z","timestamp":1670680995000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11276-020-02524-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,5]]},"references-count":52,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2021,2]]}},"alternative-id":["2524"],"URL":"https:\/\/doi.org\/10.1007\/s11276-020-02524-8","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"type":"print","value":"1022-0038"},{"type":"electronic","value":"1572-8196"}],"subject":[],"published":{"date-parts":[[2021,1,5]]},"assertion":[{"value":"11 December 2020","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 January 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that there is no conflict of interest regarding the publication of this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}