{"entities":{"Q5951862":{"pageid":8128664,"ns":120,"title":"Item:Q5951862","lastrevid":41092961,"modified":"2025-04-18T06:04:30Z","type":"item","id":"Q5951862","labels":{"en":{"language":"en","value":"Information and communications security. 3rd international conference, ICICS 2001, Xian, China, November 13--16, 2001. Proceedings"}},"descriptions":{"en":{"language":"en","value":"scientific article; zbMATH DE number 1687335"}},"aliases":{},"claims":{"P31":[{"mainsnak":{"snaktype":"value","property":"P31","hash":"fd5912e4dab4b881a8eb0eb27e7893fef55176ad","datavalue":{"value":{"entity-type":"item","numeric-id":56887,"id":"Q56887"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q5951862$CD91837C-2115-41BC-AF60-396687C945E3","rank":"normal"}],"P159":[{"mainsnak":{"snaktype":"value","property":"P159","hash":"2f082ead354eb1515b2767179eec39743a945267","datavalue":{"value":{"text":"Information and communications security. 3rd international conference, ICICS 2001, Xian, China, November 13--16, 2001. Proceedings","language":"en"},"type":"monolingualtext"},"datatype":"monolingualtext"},"type":"statement","id":"Q5951862$40233901-9CB4-454D-8436-07CDAA8ADD39","rank":"normal"}],"P225":[{"mainsnak":{"snaktype":"value","property":"P225","hash":"afe2bc379585b768eeb8905acac1be427ca843bd","datavalue":{"value":"0977.00049","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q5951862$CFA8AA63-1529-4F3D-8476-CC5D99CAAE83","rank":"normal"}],"P27":[{"mainsnak":{"snaktype":"value","property":"P27","hash":"143994f2a541b174d0698cf7034e9eafeb025195","datavalue":{"value":"10.1007/3-540-45600-7","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q5951862$D568B251-7299-4070-A155-5E0F2D91B789","rank":"normal"}],"P200":[{"mainsnak":{"snaktype":"value","property":"P200","hash":"85c07c7737819bff773f78e2590a3bb761fe677b","datavalue":{"value":{"entity-type":"item","numeric-id":162374,"id":"Q162374"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q5951862$F7A979A4-9606-4836-81D5-84771E38FBF7","rank":"normal"}],"P28":[{"mainsnak":{"snaktype":"value","property":"P28","hash":"d9e418580f2b70ce6849ba62f9449722e930b0d2","datavalue":{"value":{"time":"+2002-01-08T00:00:00Z","timezone":0,"before":0,"after":0,"precision":11,"calendarmodel":"http://www.wikidata.org/entity/Q1985727"},"type":"time"},"datatype":"time"},"type":"statement","id":"Q5951862$FBCA911C-B9C5-4A89-AC5C-2F69C9CDCDBC","rank":"normal"}],"P1448":[{"mainsnak":{"snaktype":"value","property":"P1448","hash":"f2e238ba6226c14b576608477d52ce6e434315f0","datavalue":{"value":"The articles of mathematical interest will be reviewed individually. The preceding conference (2nd, 1999) has been reviewed (see Zbl 0931.00051).  Indexed articles:  \\textit{Schnorr, Claus Peter}, Security of blind discrete log signatures against interactive attacks, 1-12 [Zbl 1050.94532]  \\textit{Liu, Dongxi; Li, Xiaoyong; Bai, Yingcai}, An intelligent intruder model for security protocol analysis, 13-22 [Zbl 1050.94528]  \\textit{Gupta, Kishan Chand; Maitra, Subhamoy}, Primitive polynomials over GF(2) -- a cryptologic approach, 23-34 [Zbl 1050.94524]  \\textit{Yang, Bo; Zhu, Shixiong; Wang, Yumin}, Unconditionally-secure oblivious transfer, 35-41 [Zbl 1050.94537]  \\textit{Chang, Chin-Chen; Lin, Iuon-Chang}, Cryptanalysis of the improved user efficient blind signatures, 42-46 [Zbl 1050.94519]  \\textit{Chang, Chin-Chen; Hwang, Kuo-Feng}, Towards the forgery of a group signature without knowing the group center's secret, 47-51 [Zbl 1050.94518]  \\textit{Bo, Xiaochen; Shen, Lincheng; Chang, Wensen}, Evaluation of the image degradation for a typical watermarking algorithm in the block-DCT domain, 52-61 [Zbl 1050.94517]  \\textit{Aoki, Kazumaro; Hoshino, Fumitaka; Kobayashi, Tetsutaro}, A cyclic window algorithm for ECC defined over extension fields, 62-73 [Zbl 1050.94516]  \\textit{Zhang, Fangguo; Zhang, Futai; Wang, Yumin}, Fast scalar multiplication on the Jacobian of a family of hyperelliptic curves, 74-83 [Zbl 1050.94541]  \\textit{Ye, Dingfeng; Yang, Junhui; Dai, Zongduo; Ou, Haiwen}, Attacks on two digital signature schemes based on error correcting codes, 84-89 [Zbl 1050.94538]  \\textit{Matsuura, Kanta}, A derivative of digital objects and estimation of default risks in electronic commerce, 90-94 [Zbl 1050.94530]  \\textit{Shim, Young-Chul}, A new approach for secure multicast routing in a large scale network, 95-106 [Zbl 1050.68559]  \\textit{Kim, Hee-Wan; Rhee, Hae-Kyung; Chung, Tai M.; Eom, Young Ik; Kim, Ung-Mo}, A transaction length-sensitive protocol based on altruistic locking for multilevel secure database systems, 107-118 [Zbl 1050.68546]  \\textit{Cho, Sungbaek; Ciechanowicz, Zbigniew}, Dealing with uncertainties in risk analysis using belief functions, 119-130 [Zbl 1050.68541]  \\textit{Hitchens, Michael; Varadharajan, Vijay}, RBAC for XML document stores, 131-143 [Zbl 1050.68544]  \\textit{Zhang, Xian-Mo; Pieprzyk, Josef}, Cheating immune secret sharing, 144-149 [Zbl 1050.94543]  \\textit{Samid, Gideon}, Encryption sticks (Randomats), 150-154 [Zbl 1050.68558]  \\textit{Song, Zhimin; Qing, Sihan}, Applying NCP logic to the analysis of SSL 3.0, 155-166 [Zbl 1050.68560]  \\textit{Herwono, Ian; Liebhardt, Ingo}, Performance of WTLS and its impact on an m-commerce transaction, 167-171 [Zbl 1050.68543]  \\textit{Ribeiro, Carlos; Z\u00faquete, Andr\u00e9; Ferreira, Paulo}, Enforcing obligation with security monitors, 172-176 [Zbl 1050.68557]  \\textit{Ning, Peng; Yin, Yiqun Lisa}, Efficient software implementation for finite field multiplication in normal basis, 177-188 [Zbl 1050.94531]  \\textit{Zhou, Jianying; Tan, Chunfu}, Playing lottery on the internet, 189-201 [Zbl 1050.68565]  \\textit{Bao, Feng; Deng, Robert}, Privacy protection for transactions of digital goods, 202-213 [Zbl 1050.68537]  \\textit{Xu, Jie-l\u00fc; Xu, Han-liang; Wang, Yan; L\u00fc, Shu-Wang}, Equivalent characterizations and applications of multi-output correlation-immune Boolean functions, 214-220 [Zbl 1050.94536]  \\textit{Wang, Guilin; Qing, Sihan; Wang, Mingsheng; Zhou, Zhanfei}, Threshold undeniable RSA signature scheme, 221-232 [Zbl 1050.94534]  \\textit{Hwang, Min-Shiang; Lee, Cheng-Chi; Tang, Yuan-Liang}, Two simple batch verifying multiple digital signatures, 233-237 [Zbl 1050.94526]  \\textit{He, Yeping; Qing, Sihan}, Square attack on reduced Camellia cipher, 238-245 [Zbl 1050.94525]  \\textit{You, Lin; Yang, Yi Xian; Zhang, Chun Qi}, Generalization of elliptic curve digital signature schemes, 246-250 [Zbl 1050.94539]  \\textit{Crispo, Bruno; Ruffo, Giancarlo}, Reasoning about accountability within delegation, 251-260 [Zbl 1050.94520]  \\textit{Pan, Gang; Wu, Yijun; Wu, Zhaohui}, A novel data hiding method for two-color images, 261-270 [Zbl 1050.68552]  \\textit{Lee, C.-H.; Deng, X.; Zhu, H.}, An identification scheme provably secure against reset attack, 271-279 [Zbl 1050.94527]  \\textit{Kunnari, Sanna}, Estimating the scalability of the internet key exchange, 280-291 [Zbl 1050.68548]  \\textit{Kuninobu, Shigeta; Takata, Yoshiaki; Seki, Hiroyuki; Inoue, Katsuro}, An efficient information flow analysis of recursive programs based on a lattice model of security classes, 292-303 [Zbl 1050.68547]  \\textit{Ye, Baoqing}, Defeating denial-of-service attacks on the internet, 304-315 [Zbl 1050.68562]  \\textit{Zhang, Dianlong; Lukhaub, Harald; Zorn, Werner}, A role-based access control model and implementation for data-centric enterprise applications, 316-327 [Zbl 1050.68564]  \\textit{Permpoontanalarp, Yongyuth; Rujimethabhas, Chaiwat}, A unified methodology for verification and synthesis of firewall configurations, 328-339 [Zbl 1050.68556]  \\textit{Chen, Yan; Bargteil, Adam; Bindel, David; Katz, Randy H.; Kubiatowicz, John}, Quantifying network denial of service: A location service case study, 340-351 [Zbl 1050.68539]  \\textit{Gonz\u00e1lez Nieto, Juan Manuel; Boyd, Colin; Dawson, Ed}, A public key cryptosystem based on the subgroup membership problem, 352-363 [Zbl 1050.94522]  \\textit{Hong, Ki-Yoong; Kim, Chul}, On a network security model for the secure information flow on multilevel secure network, 364-370 [Zbl 1050.68545]  \\textit{Luo, Wenjian; Cao, Xianbin; Wang, Xufa}, NIDS research based on artificial immunology, 371-375 [Zbl 1050.68551]  \\textit{C\u00e1novas, Oscar; G\u00f3mez, Antonio F.}, AMBAR protocol: Access management based on authorization reduction, 376-380 [Zbl 1050.68538]  \\textit{Zou, Xukai; Ramamurthy, Byrav; Magliveras, Spyros S.}, Chinese remainder theorem based hierarchical access control for secure group communication, 381-385 [Zbl 1050.68566]  \\textit{Wang, Yan; Tan, Kian-Lee}, Dispatching mobile agents with secure routes in parallel, 386-397 [Zbl 1050.68561]  \\textit{Chen, Yu; Fang, Qian; Du, Zhihui; Huang, Zhenchun; Li, Sanli}, TH-SMS: Security management system in advanced computational infrastructure, 398-407 [Zbl 1050.68540]  \\textit{Lang, Ulrich; Gollmann, Dieter; Schreiner, Rudolf}, Cryptography and middleware security, 408-418 [Zbl 1050.68549]  \\textit{Zeng, Kencheng; Yang, Chung-Huang; Rao, T. R. N.}, Cryptanalysis of the Hwang-Rao secret error-correcting code schemes, 419-428 [Zbl 1050.94540]  \\textit{Disson, Eric; Boulanger, Danielle; Dubois, Gilles}, A role-based model for access control in database federations, 429-440 [Zbl 1050.68542]  \\textit{Li, Hongpei; Chang, Lianli; Wang, Xinmei}, A useful intrusion detection system prototype to monitor multi-processes based on system calls, 441-450 [Zbl 1050.68550]  \\textit{Park, Hee-Un; Lee, Im-Yeong}, A digital nominative proxy signature scheme for mobile communication, 451-455 [Zbl 1050.68553]  \\textit{Yi, Mi Ra; Cho, Tae Ho}, Hierarchical simulation model with animation for large network security, 456-460 [Zbl 1050.68563]  \\textit{Maitland, Greg; Boyd, Colin}, Fair electronic cash based on a group signature scheme, 461-465 [Zbl 1050.94529]  \\textit{Wu, Chuan-Kun; Varadharajan, Vijay}, Fair exchange of digital signatures with offline trusted third party, 466-470 [Zbl 1050.94535]  \\textit{Park, Jong Sou; Lee, Jang-Se; Kim, Hwan Kuk; Jeong, Jeong-Rye; Yeom, Dong-Bok; Chi, Sung-Do}, SECUSIM: A tool for the cyber-attack simulation, 471-475 [Zbl 1050.68555]  \\textit{Li, Yifa}, A new semantics of authentication logic, 476-482 [Zbl 1050.94542]  \\textit{Park, Ji Hwan; Jeong, Sook Ee; Kim, Chang Soo}, Robust and fragile watermarking techniques for documents using bi-directional diagonal profiles, 483-494 [Zbl 1050.68554]  \\textit{Gram, Seenil}, Redundancy, obscurity, self-containment \\& independence, 495-501 [Zbl 1050.94523]","type":"string"},"datatype":"string"},"type":"statement","id":"Q5951862$2BE164A3-0092-4890-9A01-54FA0D0F4A01","rank":"normal"}],"P226":[{"mainsnak":{"snaktype":"value","property":"P226","hash":"6f2c17db95e93f9a5a19ff6c68b3a1df8b0c021e","datavalue":{"value":"00B25","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q5951862$252FFCD4-43D5-4A15-8698-75032C4E99BB","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"8dc5d8f03fcaaa9e07fb2b90c65b675a74eb1ab2","datavalue":{"value":"94-06","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q5951862$1BD8FC5E-5632-49E2-BE26-608E026F8AF8","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"ed293b811733fa9438a72e1b6ba5680a0d2aac9e","datavalue":{"value":"68-06","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q5951862$106A0A1A-9C80-4BA5-8FA8-BC7516D28FE1","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"b3f5570531d36cdad95fcc8cba24a2dabc5fbbbf","datavalue":{"value":"94A60","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q5951862$D8193C40-9CEF-4A16-B0E9-BB08595A67BB","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"58bd804a9b32ab16fea71636cf187b83a20de8f7","datavalue":{"value":"68P25","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q5951862$7058A3D4-EF3F-4024-BFE8-52C0FA8099F4","rank":"normal"}],"P1451":[{"mainsnak":{"snaktype":"value","property":"P1451","hash":"67249b7ac16e16aaa19e53664fd8be39bfb4767e","datavalue":{"value":"1687335","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q5951862$9B99B6B1-74A5-44D3-9CD2-026B6372EF87","rank":"normal"}],"P1450":[{"mainsnak":{"snaktype":"value","property":"P1450","hash":"39b71535bd8953880e20e56c9b411c83824556db","datavalue":{"value":"Xian (China)","type":"string"},"datatype":"string"},"type":"statement","id":"Q5951862$7ACED66D-37B1-41FC-8956-6A8E34F4E3D7","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"5c4c4bb5a86a0fdf66f908b603f2f6975f5ef6fc","datavalue":{"value":"Proceedings","type":"string"},"datatype":"string"},"type":"statement","id":"Q5951862$73E44DD5-66F1-4EB4-B680-06ADBB34E7DC","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"5d83ae477e518ffecea78688f13a2aaaeca13299","datavalue":{"value":"Conference","type":"string"},"datatype":"string"},"type":"statement","id":"Q5951862$77FA3904-24C7-4C8F-A1B9-EEABC734C56C","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"917d6e9ac37daf9ce86a50d2b5ba254bccc96b19","datavalue":{"value":"ICICS 2001","type":"string"},"datatype":"string"},"type":"statement","id":"Q5951862$8BE289DF-52D2-42B6-82B5-B86D6C89A460","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"8a631b4c31c28ded5d94827388c4651023fe04e9","datavalue":{"value":"Information security","type":"string"},"datatype":"string"},"type":"statement","id":"Q5951862$69B5B1D3-EE54-4341-8D4D-054D7777A277","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"c15e4051249fcabbb1f0d11c01fe8045a310bac7","datavalue":{"value":"Communications security","type":"string"},"datatype":"string"},"type":"statement","id":"Q5951862$0DF64E7F-E41D-4A7D-B3E5-D362BB927222","rank":"normal"}],"P1460":[{"mainsnak":{"snaktype":"value","property":"P1460","hash":"57f7fea50d2ce1b39b695c4a1313582eed405e38","datavalue":{"value":{"entity-type":"item","numeric-id":5976449,"id":"Q5976449"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q5951862$CF39E045-8ECB-4F8F-9BCA-1F818C9C0F16","rank":"normal"}],"P205":[{"mainsnak":{"snaktype":"value","property":"P205","hash":"b4e111f8d88a4a6774f501844dd1dee788ec6155","datavalue":{"value":"https://doi.org/10.1007/3-540-45600-7","type":"string"},"datatype":"url"},"type":"statement","id":"Q5951862$DBBAB1DF-6709-49F0-9CD7-BFF416890B3C","rank":"normal"}],"P388":[{"mainsnak":{"snaktype":"value","property":"P388","hash":"79a1221c534a1b7bb6aecd6f00f0393a113abb38","datavalue":{"value":"W4300074319","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q5951862$78848071-4B1C-4D3A-B637-5249B1441A2C","rank":"normal"}],"P1643":[{"mainsnak":{"snaktype":"value","property":"P1643","hash":"d21c461c0a9024ee2fe244e9863f584c3d47092f","datavalue":{"value":{"entity-type":"item","numeric-id":1412213,"id":"Q1412213"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","qualifiers":{"P1659":[{"snaktype":"value","property":"P1659","hash":"08574508681b55af56604aeda810a29a38ed2536","datavalue":{"value":{"amount":"+0.937928","unit":"1"},"type":"quantity"},"datatype":"quantity"}],"P1660":[{"snaktype":"value","property":"P1660","hash":"ac3c626774dcd0d16f89557f66586245841a01db","datavalue":{"value":{"entity-type":"item","numeric-id":6767936,"id":"Q6767936"},"type":"wikibase-entityid"},"datatype":"wikibase-item"}]},"qualifiers-order":["P1659","P1660"],"id":"Q5951862$80AF51A0-EEB0-49DF-859F-D99E68DE6F91","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1643","hash":"b66abfe1f9cebb39da3878886f4649825f5c279d","datavalue":{"value":{"entity-type":"item","numeric-id":644332,"id":"Q644332"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","qualifiers":{"P1659":[{"snaktype":"value","property":"P1659","hash":"053f3f40b11347e904148fc06dc61b870da1986e","datavalue":{"value":{"amount":"+0.9341549","unit":"1"},"type":"quantity"},"datatype":"quantity"}],"P1660":[{"snaktype":"value","property":"P1660","hash":"ac3c626774dcd0d16f89557f66586245841a01db","datavalue":{"value":{"entity-type":"item","numeric-id":6767936,"id":"Q6767936"},"type":"wikibase-entityid"},"datatype":"wikibase-item"}]},"qualifiers-order":["P1659","P1660"],"id":"Q5951862$4E7BF4F2-F166-485B-9C7F-E8A162FB8E5E","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1643","hash":"193172e2b82c1ee35439d5e18e3e60f41983db65","datavalue":{"value":{"entity-type":"item","numeric-id":1373994,"id":"Q1373994"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","qualifiers":{"P1659":[{"snaktype":"value","property":"P1659","hash":"87377306a133fefb5a0a558c192eb417bd1c26fd","datavalue":{"value":{"amount":"+0.92719644","unit":"1"},"type":"quantity"},"datatype":"quantity"}],"P1660":[{"snaktype":"value","property":"P1660","hash":"ac3c626774dcd0d16f89557f66586245841a01db","datavalue":{"value":{"entity-type":"item","numeric-id":6767936,"id":"Q6767936"},"type":"wikibase-entityid"},"datatype":"wikibase-item"}]},"qualifiers-order":["P1659","P1660"],"id":"Q5951862$CB9BF7C2-B518-4D7B-94BF-27CA85295289","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1643","hash":"9652f1e98766467f6793491a95c9b06edd7daaf7","datavalue":{"value":{"entity-type":"item","numeric-id":375908,"id":"Q375908"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","qualifiers":{"P1659":[{"snaktype":"value","property":"P1659","hash":"682fd5abece0c3990d48701eae3a5c47a6514e2d","datavalue":{"value":{"amount":"+0.92137414","unit":"1"},"type":"quantity"},"datatype":"quantity"}],"P1660":[{"snaktype":"value","property":"P1660","hash":"ac3c626774dcd0d16f89557f66586245841a01db","datavalue":{"value":{"entity-type":"item","numeric-id":6767936,"id":"Q6767936"},"type":"wikibase-entityid"},"datatype":"wikibase-item"}]},"qualifiers-order":["P1659","P1660"],"id":"Q5951862$46DCCCBF-8247-468F-A74E-205BFF847E5B","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1643","hash":"e6c8fd8f313866dcc19d154c3141edee1e14d91a","datavalue":{"value":{"entity-type":"item","numeric-id":640682,"id":"Q640682"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","qualifiers":{"P1659":[{"snaktype":"value","property":"P1659","hash":"07f2fe3d7c6bae4adb7dda927e41936234948965","datavalue":{"value":{"amount":"+0.915994","unit":"1"},"type":"quantity"},"datatype":"quantity"}],"P1660":[{"snaktype":"value","property":"P1660","hash":"ac3c626774dcd0d16f89557f66586245841a01db","datavalue":{"value":{"entity-type":"item","numeric-id":6767936,"id":"Q6767936"},"type":"wikibase-entityid"},"datatype":"wikibase-item"}]},"qualifiers-order":["P1659","P1660"],"id":"Q5951862$9D80FFE1-CE9E-4E6B-A728-625B0DC2DE62","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1643","hash":"6f56e93e1b726c428b6735f659a009ad5f280e80","datavalue":{"value":{"entity-type":"item","numeric-id":822677,"id":"Q822677"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","qualifiers":{"P1659":[{"snaktype":"value","property":"P1659","hash":"9444fdd72d36327108d8e077c715a93b0640639e","datavalue":{"value":{"amount":"+0.9155038","unit":"1"},"type":"quantity"},"datatype":"quantity"}],"P1660":[{"snaktype":"value","property":"P1660","hash":"ac3c626774dcd0d16f89557f66586245841a01db","datavalue":{"value":{"entity-type":"item","numeric-id":6767936,"id":"Q6767936"},"type":"wikibase-entityid"},"datatype":"wikibase-item"}]},"qualifiers-order":["P1659","P1660"],"id":"Q5951862$56DC7A0C-8002-4071-86A8-8146B16F9A5F","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1643","hash":"6a5b717f8453f4cfe0885e96fd7ac1b6b9d850f0","datavalue":{"value":{"entity-type":"item","numeric-id":1049885,"id":"Q1049885"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","qualifiers":{"P1659":[{"snaktype":"value","property":"P1659","hash":"830343fe583acda4c9019cfb45427cef15fef672","datavalue":{"value":{"amount":"+0.9154738","unit":"1"},"type":"quantity"},"datatype":"quantity"}],"P1660":[{"snaktype":"value","property":"P1660","hash":"ac3c626774dcd0d16f89557f66586245841a01db","datavalue":{"value":{"entity-type":"item","numeric-id":6767936,"id":"Q6767936"},"type":"wikibase-entityid"},"datatype":"wikibase-item"}]},"qualifiers-order":["P1659","P1660"],"id":"Q5951862$06EB8612-1D19-43B8-B60E-16EA817CA4B3","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1643","hash":"d34b42df3d8cacf5e752bb5ec13fa87ccade54ac","datavalue":{"value":{"entity-type":"item","numeric-id":2474790,"id":"Q2474790"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","qualifiers":{"P1659":[{"snaktype":"value","property":"P1659","hash":"218a3fbb7efa97d8ce34ba1f1da6a39dcd79f353","datavalue":{"value":{"amount":"+0.9114602","unit":"1"},"type":"quantity"},"datatype":"quantity"}],"P1660":[{"snaktype":"value","property":"P1660","hash":"ac3c626774dcd0d16f89557f66586245841a01db","datavalue":{"value":{"entity-type":"item","numeric-id":6767936,"id":"Q6767936"},"type":"wikibase-entityid"},"datatype":"wikibase-item"}]},"qualifiers-order":["P1659","P1660"],"id":"Q5951862$95C2F6E9-CDAB-4C29-A718-47E62AE5D1DE","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1643","hash":"802915f8f2c250651db0273a6ddab8af5f4b1cc0","datavalue":{"value":{"entity-type":"item","numeric-id":2508314,"id":"Q2508314"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","qualifiers":{"P1659":[{"snaktype":"value","property":"P1659","hash":"352a9bd8537f1f139082b214dbc266a300075601","datavalue":{"value":{"amount":"+0.911023","unit":"1"},"type":"quantity"},"datatype":"quantity"}],"P1660":[{"snaktype":"value","property":"P1660","hash":"ac3c626774dcd0d16f89557f66586245841a01db","datavalue":{"value":{"entity-type":"item","numeric-id":6767936,"id":"Q6767936"},"type":"wikibase-entityid"},"datatype":"wikibase-item"}]},"qualifiers-order":["P1659","P1660"],"id":"Q5951862$76867E0A-65E8-4A66-9508-93563FD224C8","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1643","hash":"268b53341e47ae0e6c8aa7ca64e7009c4faa289b","datavalue":{"value":{"entity-type":"item","numeric-id":822678,"id":"Q822678"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","qualifiers":{"P1659":[{"snaktype":"value","property":"P1659","hash":"349bb8b797ed1449f9834b9f83fbe8d2e9219d2d","datavalue":{"value":{"amount":"+0.91070926","unit":"1"},"type":"quantity"},"datatype":"quantity"}],"P1660":[{"snaktype":"value","property":"P1660","hash":"ac3c626774dcd0d16f89557f66586245841a01db","datavalue":{"value":{"entity-type":"item","numeric-id":6767936,"id":"Q6767936"},"type":"wikibase-entityid"},"datatype":"wikibase-item"}]},"qualifiers-order":["P1659","P1660"],"id":"Q5951862$765D8F71-408F-4A8B-9303-DC112EDE2FD7","rank":"normal"}]},"sitelinks":{"mardi":{"site":"mardi","title":"Publication:5951862","badges":[],"url":"https://portal.mardi4nfdi.de/wiki/Publication:5951862"}}}}}