{"id":"https://openalex.org/W1488313539","doi":"https://doi.org/10.3233/jcs-2006-14101","title":"A survey of algebraic properties used in cryptographic protocols","display_name":"A survey of algebraic properties used in cryptographic protocols","publication_year":2006,"publication_date":"2006-02-01","ids":{"openalex":"https://openalex.org/W1488313539","doi":"https://doi.org/10.3233/jcs-2006-14101","mag":"1488313539"},"language":"en","primary_location":{"id":"doi:10.3233/jcs-2006-14101","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jcs-2006-14101","pdf_url":null,"source":{"id":"https://openalex.org/S106992369","display_name":"Journal of Computer Security","issn_l":"0926-227X","issn":["0926-227X","1875-8924"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://inria.hal.science/inria-00000552","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5070402905","display_name":"V\u00e9ronique Cortier","orcid":null},"institutions":[{"id":"https://openalex.org/I1326498283","display_name":"Institut national de recherche en informatique et en automatique","ror":"https://ror.org/02kvxyf05","country_code":"FR","type":"funder","lineage":["https://openalex.org/I1326498283"]},{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"funder","lineage":["https://openalex.org/I1294671590"]},{"id":"https://openalex.org/I4210121838","display_name":"Laboratoire Lorrain de Recherche en Informatique et ses Applications","ror":"https://ror.org/02vnf0c38","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I1326498283","https://openalex.org/I277688954","https://openalex.org/I4210107720","https://openalex.org/I4210121838","https://openalex.org/I4210159245","https://openalex.org/I90183372"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"V\u00e9ronique Cortier","raw_affiliation_strings":["LORIA, CNRS UMR 7503 and INRIA Lorraine project CASSIS, Campus Scientifique \u2013 BP 239, 54506 Vandoeuvre-les-Nancy cedex, France","LORIA, CNRS UMR 7503 and INRIA Lorraine project CASSIS, Campus Scientifique \u2013 BP 239, 54506 Vandoeuvre-les-Nancy cedex, France. E-mail: cortier@loria.fr"],"affiliations":[{"raw_affiliation_string":"LORIA, CNRS UMR 7503 and INRIA Lorraine project CASSIS, Campus Scientifique \u2013 BP 239, 54506 Vandoeuvre-les-Nancy cedex, France","institution_ids":[]},{"raw_affiliation_string":"LORIA, CNRS UMR 7503 and INRIA Lorraine project CASSIS, Campus Scientifique \u2013 BP 239, 54506 Vandoeuvre-les-Nancy cedex, France. E-mail: cortier@loria.fr","institution_ids":["https://openalex.org/I4210121838","https://openalex.org/I1326498283","https://openalex.org/I1294671590"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068404835","display_name":"St\u00e9phanie Delaune","orcid":"https://orcid.org/0000-0002-9744-8834"},"institutions":[{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"funder","lineage":["https://openalex.org/I1294671590"]},{"id":"https://openalex.org/I19370010","display_name":"Orange (France)","ror":"https://ror.org/035j0tq82","country_code":"FR","type":"company","lineage":["https://openalex.org/I19370010"]},{"id":"https://openalex.org/I4210104198","display_name":"Laboratoire Sp\u00e9cification et V\u00e9rification","ror":"https://ror.org/01kz1bj67","country_code":"FR","type":"facility","lineage":["https://openalex.org/I11559806","https://openalex.org/I1294671590","https://openalex.org/I1326498283","https://openalex.org/I277688954","https://openalex.org/I4210104198","https://openalex.org/I4210159245"]},{"id":"https://openalex.org/I1326498283","display_name":"Institut national de recherche en informatique et en automatique","ror":"https://ror.org/02kvxyf05","country_code":"FR","type":"funder","lineage":["https://openalex.org/I1326498283"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"St\u00e9phanie Delaune","raw_affiliation_strings":["France T\u00e9l\u00e9com R&D, France","Laboratoire Sp\u00e9cification et V\u00e9rification, ENS de Cachan and CNRS UMR 8643 and INRIA Futurs project SECSI, 61, avenue du Pr\u00e9sident Wilson, 94235 Cachan cedex, France.,","Laboratoire Sp\u00e9cification et V\u00e9rification, ENS de Cachan and CNRS UMR 8643 and INRIA Futurs project SECSI, 61, avenue du Pr\u00e9sident Wilson, 94235 Cachan cedex, France. E-mail: delaune@lsv.ens-cachan.fr, lafourca@lsv.ens-cachan.fr"],"affiliations":[{"raw_affiliation_string":"France T\u00e9l\u00e9com R&D, France","institution_ids":["https://openalex.org/I19370010"]},{"raw_affiliation_string":"Laboratoire Sp\u00e9cification et V\u00e9rification, ENS de Cachan and CNRS UMR 8643 and INRIA Futurs project SECSI, 61, avenue du Pr\u00e9sident Wilson, 94235 Cachan cedex, France.,","institution_ids":["https://openalex.org/I4210104198","https://openalex.org/I1294671590"]},{"raw_affiliation_string":"Laboratoire Sp\u00e9cification et V\u00e9rification, ENS de Cachan and CNRS UMR 8643 and INRIA Futurs project SECSI, 61, avenue du Pr\u00e9sident Wilson, 94235 Cachan cedex, France. E-mail: delaune@lsv.ens-cachan.fr, lafourca@lsv.ens-cachan.fr","institution_ids":["https://openalex.org/I4210104198","https://openalex.org/I1326498283","https://openalex.org/I1294671590"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5024799131","display_name":"Pascal Lafourcade","orcid":"https://orcid.org/0000-0002-4459-511X"},"institutions":[{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"funder","lineage":["https://openalex.org/I1294671590"]},{"id":"https://openalex.org/I1326498283","display_name":"Institut national de recherche en informatique et en automatique","ror":"https://ror.org/02kvxyf05","country_code":"FR","type":"funder","lineage":["https://openalex.org/I1326498283"]},{"id":"https://openalex.org/I4210104198","display_name":"Laboratoire Sp\u00e9cification et V\u00e9rification","ror":"https://ror.org/01kz1bj67","country_code":"FR","type":"facility","lineage":["https://openalex.org/I11559806","https://openalex.org/I1294671590","https://openalex.org/I1326498283","https://openalex.org/I277688954","https://openalex.org/I4210104198","https://openalex.org/I4210159245"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Pascal Lafourcade","raw_affiliation_strings":["LIF, Universit\u00e9 Aix-Marseille 1 and CNRS UMR 6166, 39, r. Joliot-Curie, 13453 Marseille Cedex 13, France","Laboratoire Sp\u00e9cification et V\u00e9rification, ENS de Cachan and CNRS UMR 8643 and INRIA Futurs project SECSI, 61, avenue du Pr\u00e9sident Wilson, 94235 Cachan cedex, France.,","Laboratoire Sp\u00e9cification et V\u00e9rification, ENS de Cachan and CNRS UMR 8643 and INRIA Futurs project SECSI, 61, avenue du Pr\u00e9sident Wilson, 94235 Cachan cedex, France. E-mail: delaune@lsv.ens-cachan.fr, lafourca@lsv.ens-cachan.fr"],"affiliations":[{"raw_affiliation_string":"LIF, Universit\u00e9 Aix-Marseille 1 and CNRS UMR 6166, 39, r. Joliot-Curie, 13453 Marseille Cedex 13, France","institution_ids":["https://openalex.org/I1294671590"]},{"raw_affiliation_string":"Laboratoire Sp\u00e9cification et V\u00e9rification, ENS de Cachan and CNRS UMR 8643 and INRIA Futurs project SECSI, 61, avenue du Pr\u00e9sident Wilson, 94235 Cachan cedex, France.,","institution_ids":["https://openalex.org/I4210104198","https://openalex.org/I1294671590"]},{"raw_affiliation_string":"Laboratoire Sp\u00e9cification et V\u00e9rification, ENS de Cachan and CNRS UMR 8643 and INRIA Futurs project SECSI, 61, avenue du Pr\u00e9sident Wilson, 94235 Cachan cedex, France. E-mail: delaune@lsv.ens-cachan.fr, lafourca@lsv.ens-cachan.fr","institution_ids":["https://openalex.org/I4210104198","https://openalex.org/I1326498283","https://openalex.org/I1294671590"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5070402905"],"corresponding_institution_ids":["https://openalex.org/I1294671590","https://openalex.org/I1326498283","https://openalex.org/I4210121838"],"apc_list":null,"apc_paid":null,"fwci":17.0302,"has_fulltext":false,"cited_by_count":149,"citation_normalized_percentile":{"value":0.9923408,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"14","issue":"1","first_page":"1","last_page":"43"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.6523000001907349,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.6523000001907349,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.2671999931335449,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.015200000256299973,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.834966778755188},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.8218334913253784},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7498139142990112},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6296894550323486},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5903922319412231},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5574474930763245},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5047718286514282},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.4721919298171997},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.41874077916145325},{"id":"https://openalex.org/keywords/algebraic-number","display_name":"Algebraic number","score":0.41387060284614563},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.30773866176605225},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.19021186232566833}],"concepts":[{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.834966778755188},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.8218334913253784},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7498139142990112},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6296894550323486},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5903922319412231},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5574474930763245},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5047718286514282},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.4721919298171997},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.41874077916145325},{"id":"https://openalex.org/C9376300","wikidata":"https://www.wikidata.org/wiki/Q168817","display_name":"Algebraic number","level":2,"score":0.41387060284614563},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.30773866176605225},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.19021186232566833},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.3233/jcs-2006-14101","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jcs-2006-14101","pdf_url":null,"source":{"id":"https://openalex.org/S106992369","display_name":"Journal of Computer Security","issn_l":"0926-227X","issn":["0926-227X","1875-8924"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Security","raw_type":"journal-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.719.1226","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.719.1226","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.loria.fr/%7Ecortier/Papiers/survey.pdf","raw_type":"text"},{"id":"pmh:oai:HAL:inria-00000552v1","is_oa":true,"landing_page_url":"https://inria.hal.science/inria-00000552","pdf_url":null,"source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Computer Security, 2006, 14 (1), pp.1-43","raw_type":"Journal articles"}],"best_oa_location":{"id":"pmh:oai:HAL:inria-00000552v1","is_oa":true,"landing_page_url":"https://inria.hal.science/inria-00000552","pdf_url":null,"source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Computer Security, 2006, 14 (1), pp.1-43","raw_type":"Journal articles"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":97,"referenced_works":["https://openalex.org/W28167893","https://openalex.org/W51944995","https://openalex.org/W166463596","https://openalex.org/W856809851","https://openalex.org/W1479740358","https://openalex.org/W1487139370","https://openalex.org/W1490590996","https://openalex.org/W1509743338","https://openalex.org/W1515715680","https://openalex.org/W1521664307","https://openalex.org/W1522597308","https://openalex.org/W1525750584","https://openalex.org/W1529862094","https://openalex.org/W1531001456","https://openalex.org/W1531461242","https://openalex.org/W1536045256","https://openalex.org/W1538657331","https://openalex.org/W1544182777","https://openalex.org/W1545900962","https://openalex.org/W1546053434","https://openalex.org/W1548880861","https://openalex.org/W1550745077","https://openalex.org/W1557783852","https://openalex.org/W1564977777","https://openalex.org/W1570101401","https://openalex.org/W1579090196","https://openalex.org/W1580733778","https://openalex.org/W1585295789","https://openalex.org/W1595293097","https://openalex.org/W1607166944","https://openalex.org/W1619409532","https://openalex.org/W1635081860","https://openalex.org/W1788426572","https://openalex.org/W1938103548","https://openalex.org/W1967744155","https://openalex.org/W1968715010","https://openalex.org/W1970823784","https://openalex.org/W1975688140","https://openalex.org/W1990875740","https://openalex.org/W1991374982","https://openalex.org/W1995759750","https://openalex.org/W2001788001","https://openalex.org/W2003736153","https://openalex.org/W2013613544","https://openalex.org/W2019884366","https://openalex.org/W2023017076","https://openalex.org/W2034753880","https://openalex.org/W2036378739","https://openalex.org/W2060349224","https://openalex.org/W2078671172","https://openalex.org/W2084798250","https://openalex.org/W2088096459","https://openalex.org/W2092548536","https://openalex.org/W2097134979","https://openalex.org/W2099171290","https://openalex.org/W2100569778","https://openalex.org/W2102632861","https://openalex.org/W2104494325","https://openalex.org/W2106169428","https://openalex.org/W2106228211","https://openalex.org/W2108533001","https://openalex.org/W2108731912","https://openalex.org/W2108834246","https://openalex.org/W2114104031","https://openalex.org/W2114189125","https://openalex.org/W2114566185","https://openalex.org/W2114620376","https://openalex.org/W2118048534","https://openalex.org/W2118360774","https://openalex.org/W2120600989","https://openalex.org/W2126338744","https://openalex.org/W2128227627","https://openalex.org/W2128758858","https://openalex.org/W2130123502","https://openalex.org/W2131123432","https://openalex.org/W2131664217","https://openalex.org/W2132172731","https://openalex.org/W2134046806","https://openalex.org/W2134587548","https://openalex.org/W2138622650","https://openalex.org/W2138769968","https://openalex.org/W2138784757","https://openalex.org/W2140665129","https://openalex.org/W2144752539","https://openalex.org/W2146973388","https://openalex.org/W2150682469","https://openalex.org/W2153921791","https://openalex.org/W2155032609","https://openalex.org/W2156050784","https://openalex.org/W2156186849","https://openalex.org/W2163758100","https://openalex.org/W2169908972","https://openalex.org/W2170220035","https://openalex.org/W2170718011","https://openalex.org/W2224085299","https://openalex.org/W2230934865","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2904818008","https://openalex.org/W2904314268","https://openalex.org/W57958781","https://openalex.org/W1554274402","https://openalex.org/W87530933","https://openalex.org/W2289378658","https://openalex.org/W1531360494","https://openalex.org/W1988007309","https://openalex.org/W154233216","https://openalex.org/W2102905434"],"abstract_inverted_index":{"Cryptographic":[0],"protocols":[1,68,103],"are":[2],"successfully":[3],"analyzed":[4],"using":[5,106],"formal":[6,9,119],"methods.":[7],"However,":[8],"approaches":[10,120],"usually":[11],"consider":[12],"the":[13,35,53,64,115],"encryption":[14],"schemes":[15],"as":[16,79],"black":[17],"boxes":[18],"and":[19,58,94],"assume":[20],"that":[21],"an":[22,28,38,112],"adversary":[23],"cannot":[24],"learn":[25],"anything":[26],"from":[27],"encrypted":[29],"message":[30],"except":[31],"if":[32],"he":[33],"has":[34],"key.":[36],"Such":[37],"assumption":[39],"is":[40],"too":[41],"strong":[42],"in":[43,49,118],"general":[44],"since":[45],"some":[46,67,72,87],"attacks":[47,105],"exploit":[48],"a":[50,84],"clever":[51],"way":[52],"interaction":[54],"between":[55],"protocol":[56],"rules":[57],"properties":[59,74,90],"of":[60,66,75,86,91,97,102,114],"cryptographic":[61,76,92,123],"operators.":[62],"Moreover,":[63],"executability":[65],"relies":[69],"explicitly":[70],"on":[71],"algebraic":[73,89],"primitives":[77],"such":[78],"commutative":[80],"encryption.":[81],"We":[82,109],"give":[83,111],"list":[85],"relevant":[88],"operators,":[93],"for":[95,121],"each":[96],"them,":[98],"we":[99],"provide":[100],"examples":[101],"or":[104],"these":[107],"properties.":[108],"also":[110],"overview":[113],"existing":[116],"methods":[117],"analyzing":[122],"protocols.":[124]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":6},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":6},{"year":2016,"cited_by_count":6},{"year":2015,"cited_by_count":4},{"year":2014,"cited_by_count":7},{"year":2013,"cited_by_count":4},{"year":2012,"cited_by_count":9}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
