{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T20:04:55Z","timestamp":1726085095577},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030487904"},{"type":"electronic","value":"9783030487911"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-48791-1_32","type":"book-chapter","created":{"date-parts":[[2020,5,27]],"date-time":"2020-05-27T14:02:52Z","timestamp":1590588172000},"page":"410-422","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Fuzzy Logic Application to Searchable Cryptography"],"prefix":"10.1007","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-3568-0715","authenticated-orcid":false,"given":"Hassan B.","family":"Kazemian","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0003-2445-3226","authenticated-orcid":false,"given":"Yang","family":"Ma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,5,28]]},"reference":[{"key":"32_CR1","doi-asserted-by":"publisher","first-page":"506","DOI":"10.1007\/978-3-540-24676-3_30","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"Dan Boneh","year":"2004","unstructured":"Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Advances in Cryptology - EUROCRYPT, pp. 506\u2013522 (2004)"},{"key":"32_CR2","doi-asserted-by":"crossref","unstructured":"Baek, J., Safavi-Naini, R., Susilo, W.: Public key encryption with keyword search revisited. In: Computational Science and its Applications? ICCSA 2008, pp. 1249\u20131259 (2008)","DOI":"10.1007\/978-3-540-69839-5_96"},{"key":"32_CR3","doi-asserted-by":"crossref","unstructured":"Byun, J., Rhee, H., Park, H., Lee, D.: Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. Lecture Notes in Computer Science, pp. 75\u201383 (2006)","DOI":"10.1007\/11844662_6"},{"key":"32_CR4","doi-asserted-by":"crossref","unstructured":"Yau, W., Heng, S., Goi, B.: Off-line keyword guessing attacks on recent public key encryption with keyword search schemes. Lecture Notes in Computer Science, pp. 100\u2013105 (2008)","DOI":"10.1007\/978-3-540-69295-9_10"},{"key":"32_CR5","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/978-3-642-16441-5_11","volume-title":"Public Key Infrastructures, Services and Applications","author":"Qiang Tang","year":"2010","unstructured":"Tang, Q., Chen, L.: Public-key encryption with registered keyword search. In: Public Key Infrastructures, Services and Applications, pp. 163\u2013178 (2010)"},{"issue":"5","key":"32_CR6","doi-asserted-by":"publisher","first-page":"763","DOI":"10.1016\/j.jss.2009.11.726","volume":"83","author":"H Rhee","year":"2010","unstructured":"Rhee, H., Park, J., Susilo, W., Lee, D.: Trapdoor security in a searchable public-key encryption scheme with a designated tester. J. Syst. Softw. 83(5), 763\u2013771 (2010)","journal-title":"J. Syst. Softw."},{"key":"32_CR7","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/978-3-319-46298-1_17","volume-title":"Network and System Security","author":"Tingting Wang","year":"2016","unstructured":"Wang, T., Au, M., Wu, W.: An efficient secure channel free searchable encryption scheme with multiple keywords. In: Network and System Security, vol. 9955, pp. 251\u2013265 (2016)"},{"issue":"1","key":"32_CR8","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/TSMC.1973.5408575","volume":"3","author":"L Zadeh","year":"1973","unstructured":"Zadeh, L.: Outline of a new approach to the analysis of complex systems and decision processes. IEEE Trans. Syst. Man Cybern SMC 3(1), 28\u201344 (1973)","journal-title":"IEEE Trans. Syst. Man Cybern SMC"},{"issue":"1","key":"32_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/S0020-7373(75)80002-2","volume":"7","author":"EH Mamdani","year":"1975","unstructured":"Mamdani, E.H., Assilian, S.: An experiment in linguistic synthesis with a fuzzy logic controller. Int. J. Man-Mach. Stud. 7(1), 1\u201313 (1975)","journal-title":"Int. J. Man-Mach. Stud."},{"key":"32_CR10","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1109\/TSMC.1985.6313399","volume":"15","author":"T Takagi","year":"1985","unstructured":"Takagi, T., Sugeno, M.: Fuzzy identification of systems and its applications to modeling and control. IEEE Trans. Syst. Man Cybern. 15, 116\u2013132 (1985)","journal-title":"IEEE Trans. Syst. Man Cybern."},{"key":"32_CR11","first-page":"22","volume":"65","author":"J Singh","year":"2006","unstructured":"Singh, J., Singh, N., Sharma, J.K.: Fuzzy modeling and identification of intelligent control for refrigeration compressor. J. Sci. Ind. Res. 65, 22\u201330 (2006)","journal-title":"J. Sci. Ind. Res."},{"key":"32_CR12","doi-asserted-by":"publisher","first-page":"1188","DOI":"10.1016\/j.ecolind.2009.02.006","volume":"9","author":"A Lermontov","year":"2009","unstructured":"Lermontov, A., Yokoyama, L., Lermontov, M., Machado, M.A.S.: River quality analysis using fuzzy water quality index: Ribeira do Iguape river watershed, Brazil. Ecol. Indic. 9, 1188\u20131197 (2009)","journal-title":"Ecol. Indic."},{"key":"32_CR13","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1016\/j.ecolind.2008.07.004","volume":"9","author":"A Marchini","year":"2009","unstructured":"Marchini, A., Facchinetti, T., Mistri, M.: F-IND: a framework to design fuzzy indices of environmental conditions. Ecol. Indic. 9, 485\u2013496 (2009)","journal-title":"Ecol. Indic."},{"key":"32_CR14","doi-asserted-by":"crossref","unstructured":"De Caro, A., Iovino, V.: JPBC: Java pairing based cryptography. In: 2011 IEEE Symposium on Computers and Communications (ISCC) (2011)","DOI":"10.1109\/ISCC.2011.5983948"},{"issue":"Supplement 1","key":"32_CR15","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1080\/18756891.2013.818190","volume":"6","author":"P Cingolani","year":"2013","unstructured":"Cingolani, P., Alcal\u00e1-Fdez, J.: jFuzzyLogic: a Java library to design fuzzy logic controllers according to the standard for fuzzy control programming. Int. J. Comput. Intell. Syst. 6(Supplement 1), 61\u201375 (2013)","journal-title":"Int. J. Comput. Intell. Syst."},{"key":"32_CR16","doi-asserted-by":"crossref","unstructured":"Cingolani, P., Alcala-Fdez, J.: jFuzzyLogic: a robust and flexible Fuzzy-Logic inference system language implementation. In: 2012 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE). IEEE (2012)","DOI":"10.1109\/FUZZ-IEEE.2012.6251215"}],"container-title":["Proceedings of the International Neural Networks Society","Proceedings of the 21st EANN (Engineering Applications of Neural Networks) 2020 Conference"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-48791-1_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,27]],"date-time":"2020-05-27T14:11:20Z","timestamp":1590588680000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-48791-1_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030487904","9783030487911"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-48791-1_32","relation":{},"ISSN":["2661-8141","2661-815X"],"issn-type":[{"type":"print","value":"2661-8141"},{"type":"electronic","value":"2661-815X"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"28 May 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"EANN","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Engineering Applications of Neural Networks","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Halkidiki","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 June 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 June 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eann2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.eann2020.eu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}