{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T06:41:16Z","timestamp":1743144076118,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":6,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811041532"},{"type":"electronic","value":"9789811041549"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-4154-9_33","type":"book-chapter","created":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T00:29:21Z","timestamp":1489710561000},"page":"282-289","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Cryptanalysis of \u201cAn Efficient Searchable Encryption Against Keyword Guessing Attacks for Shareable Electronic Medical Records in Cloud-Based System\u201d"],"prefix":"10.1007","author":[{"given":"Chun-Ta","family":"Li","sequence":"first","affiliation":[]},{"given":"Cheng-Chi","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Chi-Yao","family":"Weng","sequence":"additional","affiliation":[]},{"given":"Tsu-Yang","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Chien-Ming","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,18]]},"reference":[{"key":"33_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1249","DOI":"10.1007\/978-3-540-69839-5_96","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2008","author":"J Baek","year":"2008","unstructured":"Baek, J., Safavi-Naini, R., Susilo, W.: Public key encryption with keyword search revisited. In: Gervasi, O., Murgante, B., Lagan\u00e0, A., Taniar, D., Mun, Y., Gavrilova, M.L. (eds.) ICCSA 2008. LNCS, vol. 5072, pp. 1249\u20131259. Springer, Heidelberg (2008). doi:\n                    10.1007\/978-3-540-69839-5_96"},{"key":"33_CR2","first-page":"221","volume":"238","author":"LM Fang","year":"2013","unstructured":"Fang, L.M., Susilo, W., Ge, C.P., Wang, J.D.: Public key encryption with keyword search secure against keyword guessing attacks without random oracle. J. Syst. Softw. 238, 221\u2013241 (2013)","journal-title":"J. Syst. Softw."},{"issue":"2","key":"33_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-014-0178-y","volume":"39","author":"L Guo","year":"2015","unstructured":"Guo, L., Yau, W.C.: Efficient secure-channel free public key encryption with keyword search for EMRs in cloud storage. J. Med. Syst. 39(2), 1\u201311 (2015). doi:\n                    10.1007\/s10916-014-0178-y\n                    \n                  . Article no. 11","journal-title":"J. Med. Syst."},{"issue":"3","key":"33_CR4","doi-asserted-by":"publisher","first-page":"1601","DOI":"10.1007\/s11071-015-1965-9","volume":"80","author":"CT Li","year":"2015","unstructured":"Li, C.T., Lee, C.W., Shen, J.J.: An extended chaotic maps based keyword search scheme over encrypted data resist outside and inside keyword guessing attacks in cloud storage services. Nonlinear Dyn. 80(3), 1601\u20131611 (2015)","journal-title":"Nonlinear Dyn."},{"issue":"5","key":"33_CR5","doi-asserted-by":"publisher","first-page":"763","DOI":"10.1016\/j.jss.2009.11.726","volume":"83","author":"HS Rhee","year":"2010","unstructured":"Rhee, H.S., Park, J.H., Susilo, W., Dong, H.L.: Trapdoor security in a searchable public-key encryption scheme with a designated tester. J. Syst. Softw. 83(5), 763\u2013771 (2010)","journal-title":"J. Syst. Softw."},{"issue":"12","key":"33_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-016-0609-z","volume":"40","author":"Y Wu","year":"2016","unstructured":"Wu, Y., Lu, X., Su, J., Chen, P.: An efficient searchable encryption against keyword guessing attacks for searchable electronic medical records in cloud-based system. J. Med. Syst. 40(12), 1\u20139 (2016). doi:\n                    10.1007\/s10916-016-0609-z\n                    \n                  . Article no. 258","journal-title":"J. Med. Syst."}],"container-title":["Lecture Notes in Electrical Engineering","Information Science and Applications 2017"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-4154-9_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T13:34:48Z","timestamp":1558445688000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-4154-9_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811041532","9789811041549"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-4154-9_33","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"18 March 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICISA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Science and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Macau","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 March 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 March 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icisa2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/icatse.org\/icisa2017\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}