{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T03:17:21Z","timestamp":1740107841942,"version":"3.37.3"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2015,7,14]],"date-time":"2015-07-14T00:00:00Z","timestamp":1436832000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Outstanding Young Scientists Foundation Grant of Shandong Province","award":["No.BS2014DX016"],"award-info":[{"award-number":["No.BS2014DX016"]}]},{"DOI":"10.13039\/501100004307","name":"Distinguished Middle-Aged and Young Scientist Encourage and Reward Foundation of Shandong Province","doi-asserted-by":"crossref","award":["No. Yq2013126"],"award-info":[{"award-number":["No. Yq2013126"]}],"id":[{"id":"10.13039\/501100004307","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2016,2]]},"DOI":"10.1007\/s00500-015-1773-7","type":"journal-article","created":{"date-parts":[[2015,7,13]],"date-time":"2015-07-13T11:09:58Z","timestamp":1436785798000},"page":"429-438","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Rational computing protocol based on fuzzy theory"],"prefix":"10.1007","volume":"20","author":[{"given":"Yilei","family":"Wang","sequence":"first","affiliation":[]},{"given":"Tao","family":"Li","sequence":"additional","affiliation":[]},{"given":"Lufeng","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Ping","family":"Li","sequence":"additional","affiliation":[]},{"given":"Ho-fung","family":"Leung","sequence":"additional","affiliation":[]},{"given":"Zhe","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Qiuliang","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,14]]},"reference":[{"key":"1773_CR1","doi-asserted-by":"crossref","unstructured":"Abraham I, Dolev D, Gonen R, Halpern J (2006) Distributed computing meets game theory: robust mechanisms for rational secret sharing and multiparty computation. In: Proceedings of the 25th annual ACM symposium on Principles of distributed computing, ACM, pp 53\u201362","DOI":"10.1145\/1146381.1146393"},{"key":"1773_CR2","doi-asserted-by":"crossref","unstructured":"Asharov G, Canetti R, Hazay C (2011) Towards a game theoretic view of secure computation. In: Advances in Cryptology\u2013EUROCRYPT 2011, Springer, pp 426\u2013445","DOI":"10.1007\/978-3-642-20465-4_24"},{"key":"1773_CR3","doi-asserted-by":"crossref","unstructured":"Cai Y, Leung H (2008) A formal model of fuzzy ontology with property hierarchy and object membership. In: Conceptual Modeling-ER 2008, Springer, pp 69\u201382","DOI":"10.1007\/978-3-540-87877-3_7"},{"issue":"2","key":"1773_CR4","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1007\/s12652-011-0070-2","volume":"4","author":"A Castiglione","year":"2013","unstructured":"Castiglione A, Cattaneo G, Cembalo M, Petrillo UF (2013) Experimentations with source camera identification and online social networks. J Ambient Intell Humaniz Comput 4(2):265\u2013274","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"1773_CR5","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1016\/j.future.2014.07.001","volume":"43","author":"A Castiglione","year":"2015","unstructured":"Castiglione A, Pizzolante R, De Santis A, Carpentieri B, Castiglione A, Palmieri F (2015) Cloud-based adaptive compression and secure management services for 3d healthcare data. Future Gener Comput Sys 43:120\u2013134","journal-title":"Future Gener Comput Sys"},{"issue":"8","key":"1773_CR6","doi-asserted-by":"crossref","first-page":"1493","DOI":"10.1016\/j.ins.2010.12.012","volume":"181","author":"X Chen","year":"2011","unstructured":"Chen X, Wu Q, Zhang F, Tian H, Wei B, Lee B, Lee H, Kim K (2011) New receipt-free voting scheme using double-trapdoor commitment. Inf Sci 181(8):1493\u20131502","journal-title":"Inf Sci"},{"key":"1773_CR7","doi-asserted-by":"crossref","unstructured":"Chen X, Li J, Ma J, Tang Q, Lou W (2012a) New algorithms for secure outsourcing of modular exponentiations. In: Computer Security\u2013ESORICS 2012, Springer, pp 541\u2013556","DOI":"10.1007\/978-3-642-33167-1_31"},{"issue":"6","key":"1773_CR8","doi-asserted-by":"crossref","first-page":"1687","DOI":"10.1109\/TIFS.2012.2210880","volume":"7","author":"X Chen","year":"2012","unstructured":"Chen X, Li J, Susilo W (2012b) Efficient fair conditional payments for outsourcing computations. Inf Forens Secur IEEE Trans 7(6):1687\u20131694","journal-title":"Inf Forens Secur IEEE Trans"},{"issue":"1","key":"1773_CR9","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1007\/s12652-012-0135-x","volume":"5","author":"F Doctor","year":"2014","unstructured":"Doctor F, Iqbal R, Naguib RNG (2014) A fuzzy ambient intelligent agents approach for monitoring disease progression of dementia patients. J Ambient Intell Humaniz Comput 5(1):147\u2013158","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"1773_CR10","doi-asserted-by":"crossref","unstructured":"Esposito C, Ficco M, Palmieri F, Castiglione A (2015) Smart cloud storage service selection based on fuzzy logic theory of evidence and game theory. IEEE Trans Comput. doi: 10.1109\/TC.2015.2389952","DOI":"10.1109\/TC.2015.2389952"},{"issue":"9","key":"1773_CR11","doi-asserted-by":"crossref","first-page":"1795","DOI":"10.1007\/s00500-013-1202-8","volume":"18","author":"X Fatos","year":"2014","unstructured":"Fatos X, Wang J, Chen X, Liu JK, Li J, Krause P (2014) An efficient phr service system supporting fuzzy keyword search and fine-grained access control. Soft Comput 18(9):1795\u20131802","journal-title":"Soft Comput"},{"key":"1773_CR12","doi-asserted-by":"crossref","unstructured":"Garay J, Katz J, Maurer U, Tackmann B, Zikas V (2013) Rational protocol design: cryptography against incentive-driven adversaries. In: Foundations of Computer Science (FOCS), 2013 IEEE 54th Annual Symposium on, IEEE, pp 648\u2013657","DOI":"10.1109\/FOCS.2013.75"},{"key":"1773_CR13","doi-asserted-by":"crossref","unstructured":"Groce A, Katz J (2012) Fair computation with rational players. In: EUROCRYPT 2012, pages 81\u201398. Springer","DOI":"10.1007\/978-3-642-29011-4_7"},{"key":"1773_CR14","unstructured":"Halpern J, Pass R (2010) Game theory with costly computation: formulation and application to protocol security. In: ICS 2010, Tsinghua University Press, pp 120\u2013142"},{"key":"1773_CR15","doi-asserted-by":"crossref","unstructured":"Halpern J, Teague V (2004) Rational secret sharing and multiparty computation: extended abstract. In: STOC \u201904: Proceedings of the thirty-sixth annual ACM symposium on Theory of computing, New York, ACM, pp 623\u2013632","DOI":"10.1145\/1007352.1007447"},{"issue":"1","key":"1773_CR16","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1504\/IJGUC.2015.066397","volume":"6","author":"S Javanmardi","year":"2015","unstructured":"Javanmardi S, Shojafar M, Shariatmadari S, Ahrabi SS (2015) Fr trust: a fuzzy reputation-based model for trust management in semantic p2p grids. Int J Grid Util Comput 6(1):57\u201366","journal-title":"Int J Grid Util Comput"},{"key":"1773_CR17","doi-asserted-by":"crossref","unstructured":"Li J, Wang Q, Wang C, Cao N, Ren K, Lou W (2010) Fuzzy keyword search over encrypted data in cloud computing. In: INFOCOM, 2010 Proceedings IEEE, pp 1\u20135","DOI":"10.1109\/INFCOM.2010.5462196"},{"issue":"8","key":"1773_CR18","doi-asserted-by":"crossref","first-page":"2201","DOI":"10.1109\/TPDS.2013.271","volume":"25","author":"J Li","year":"2014","unstructured":"Li J, Huang X, Li J, Chen X, Xiang Y (2014) Securely outsourcing attribute-based encryption with checkability. Parallel Distrib Sys IEEE Trans 25(8):2201\u20132210","journal-title":"Parallel Distrib Sys IEEE Trans"},{"key":"1773_CR19","doi-asserted-by":"crossref","first-page":"180","DOI":"10.1007\/11818175_11","volume-title":"CRYPTO 2006","author":"A Lysyanskaya","year":"2006","unstructured":"Lysyanskaya A, Triandopoulos N (2006) Rationality and adversarial behavior in multi-party computation. In: Dwork C (ed) CRYPTO 2006. Springer, Heidelberg, pp 180\u2013197"},{"key":"1773_CR20","doi-asserted-by":"crossref","unstructured":"De Mantaras RL, Godo L, Plaza E, Sierra C (2015) A survey of contributions to fuzzy logic and its applications to artificial intelligence at the iiia. In: Enric Trillas: A Passion for Fuzzy Sets, Springer, pp 67\u201378","DOI":"10.1007\/978-3-319-16235-5_6"},{"key":"1773_CR21","volume-title":"A course in game theory","author":"MJ Osborne","year":"2004","unstructured":"Osborne MJ, Rubinstein A (2004) A course in game theory. MIT Press, Cambridge"},{"issue":"12","key":"1773_CR22","doi-asserted-by":"crossref","first-page":"2355","DOI":"10.1007\/s00500-010-0666-z","volume":"15","author":"DG Stavrakoudis","year":"2011","unstructured":"Stavrakoudis DG, Theocharis JB, Zalidis GC (2011) A multistage genetic fuzzy classifier for land cover classification from satellite imagery. Soft Comput 15(12):2355\u20132374","journal-title":"Soft Comput"},{"key":"1773_CR23","doi-asserted-by":"crossref","unstructured":"Straccia U (2005) Towards a fuzzy description logic for the semantic web (preliminary report). In: The Semantic Web: Research and Applications, Springer, pp 167\u2013181","DOI":"10.1007\/11431053_12"},{"issue":"1","key":"1773_CR24","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s12652-010-0027-x","volume":"2","author":"A Vaccaro","year":"2011","unstructured":"Vaccaro A, Zobaa AF (2011) Cooperative fuzzy controllers for autonomous voltage regulation in smart grids. J Ambient Intell Humaniz Comput 2(1):1\u201310","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"1773_CR25","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TFUZZ.2015.2470530","volume":"262","author":"V Vychodil","year":"2015","unstructured":"Vychodil V, Kuhr T (2015) Fuzzy logic programming reduced to reasoning with attribute implications. Fuzzy Sets and Systems 262:1\u201320","journal-title":"Fuzzy Sets and Systems"},{"issue":"7","key":"1773_CR26","doi-asserted-by":"crossref","first-page":"1128","DOI":"10.1002\/sec.844","volume":"7","author":"Y Wang","year":"2014","unstructured":"Wang Y, Liu Z, Xu Q (2014) New rational parties relying on reputation. Secur Commun Netw 7(7):1128\u20131137","journal-title":"Secur Commun Netw"},{"issue":"2","key":"1773_CR27","doi-asserted-by":"crossref","first-page":"284","DOI":"10.1002\/sec.979","volume":"8","author":"Y Wang","year":"2015","unstructured":"Wang Y, Wong DS, Zhao C, Xu Q (2015a) Fair two-party computation with rational parties holding private types. Secu Commun Netw 8(2):284\u2013297","journal-title":"Secu Commun Netw"},{"issue":"2","key":"1773_CR28","doi-asserted-by":"crossref","first-page":"284","DOI":"10.1002\/sec.979","volume":"8","author":"Y Wang","year":"2015","unstructured":"Wang Y, Wong DS, Zhao C, Xu Q (2015b) Fair two-party computation with rational parties holding private types. Secur Commun Netw 8(2):284\u2013297","journal-title":"Secur Commun Netw"},{"key":"1773_CR29","doi-asserted-by":"crossref","unstructured":"Wang Y, Zhao C, Xu Q, Zheng Z, Chen Z, Liu Z (2015c) Fair secure computation with reputation assumptions in the mobile social networks. Mobile Information Systems 2015","DOI":"10.1155\/2015\/637458"},{"key":"1773_CR30","unstructured":"Xu B, Peng Z, Xiao F, Gates AM, Yu J (2014) Dynamic deployment of virtual machines in cloud computing using multi-objective optimization. Soft Comput, pp 1\u20139"},{"key":"1773_CR31","doi-asserted-by":"crossref","unstructured":"Yao AC (1982) Protocols for secure computation. In: 23rd Annual Symposium on Foundations of Computer Science (FOCS), IEEE pp 160\u2013164","DOI":"10.1109\/SFCS.1982.38"},{"key":"1773_CR32","doi-asserted-by":"crossref","unstructured":"Yao AC (1986) How to generate and exchange secrets. In: 27th Annual Symposium on Foundations of Computer Science (FOCS), IEEE, pp 162\u2013167","DOI":"10.1109\/SFCS.1986.25"},{"key":"1773_CR33","doi-asserted-by":"crossref","unstructured":"Yeung CA, Leung H. (2006) Ontology with likeliness and typicality of objects in concepts. In: Conceptual Modeling-ER 2006, Springer, pp 98\u2013111","DOI":"10.1007\/11901181_9"},{"key":"1773_CR34","doi-asserted-by":"crossref","unstructured":"Zimmermann HJ (2001) Fuzzy set theory-and its applications. Springer Science & Business Media","DOI":"10.1007\/978-94-010-0646-0"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-015-1773-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-015-1773-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-015-1773-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,28]],"date-time":"2019-08-28T01:32:36Z","timestamp":1566955956000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-015-1773-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7,14]]},"references-count":34,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2016,2]]}},"alternative-id":["1773"],"URL":"https:\/\/doi.org\/10.1007\/s00500-015-1773-7","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"type":"print","value":"1432-7643"},{"type":"electronic","value":"1433-7479"}],"subject":[],"published":{"date-parts":[[2015,7,14]]}}}