{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,3]],"date-time":"2025-09-03T10:16:29Z","timestamp":1756894589785,"version":"3.37.3"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,5,24]],"date-time":"2021-05-24T00:00:00Z","timestamp":1621814400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,5,24]],"date-time":"2021-05-24T00:00:00Z","timestamp":1621814400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Evolving Systems"],"published-print":{"date-parts":[[2021,9]]},"DOI":"10.1007\/s12530-021-09387-0","type":"journal-article","created":{"date-parts":[[2021,5,24]],"date-time":"2021-05-24T13:02:56Z","timestamp":1621861376000},"page":"687-699","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Public key authenticated encryption with multiple keywords search using Mamdani system"],"prefix":"10.1007","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2445-3226","authenticated-orcid":false,"given":"Yang","family":"Ma","sequence":"first","affiliation":[]},{"given":"Hassan","family":"Kazemian","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,5,24]]},"reference":[{"key":"9387_CR1","doi-asserted-by":"crossref","unstructured":"Baek J, Safavi-Naini R, Susilo W (2008) Public key encryption with keyword search revisited. Computational science and its applications? ICCSA, pp 1249\u20131259","DOI":"10.1007\/978-3-540-69839-5_96"},{"issue":"3152","key":"9387_CR2","first-page":"443","volume":"2004","author":"D Boneh","year":"2004","unstructured":"Boneh D, Boyen X (2004) Secure identity based encryption without random oracles. Adv Cryptol CRYPTO 2004(3152):443\u2013459","journal-title":"Adv Cryptol CRYPTO"},{"key":"9387_CR3","first-page":"506","volume":"2004","author":"D Boneh","year":"2004","unstructured":"Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. Adv Cryptol EUROCRYPT 2004:506\u2013522","journal-title":"Adv Cryptol EUROCRYPT"},{"key":"9387_CR4","doi-asserted-by":"crossref","unstructured":"Brier E, Clavier C, Olivier F (2004) Correlation power analysis with a leakage model. Lecture notes in computer science, pp 16\u201329","DOI":"10.1007\/978-3-540-28632-5_2"},{"key":"9387_CR5","doi-asserted-by":"crossref","unstructured":"Byun J, Rhee H, Park H, Lee D (2006) Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. Lecture notes in computer science, pp 75\u201383","DOI":"10.1007\/11844662_6"},{"key":"9387_CR6","doi-asserted-by":"crossref","unstructured":"Chari S, Rao J, Rohatgi P (2003) Template attacks? CHES 2002, Springer, 2003, LNCS 2523, pp 51\u201362","DOI":"10.1007\/3-540-36400-5_3"},{"issue":"4","key":"9387_CR7","doi-asserted-by":"publisher","first-page":"922","DOI":"10.1093\/comjnl\/bxu013","volume":"58","author":"YC Chen","year":"2015","unstructured":"Chen YC (2015) SPEKS: secure server-designation public key encryption with keyword search against keyword guessing attacks. Comput J 58(4):922\u2013933","journal-title":"Comput J"},{"key":"9387_CR8","doi-asserted-by":"crossref","unstructured":"Cingolani P, Alcala-Fdez J (2012) jFuzzyLogic: a robust and flexible Fuzzy-Logic inference system language implementation. Fuzzy systems (FUZZ-IEEE), 2012 IEEE international conference on. IEEE","DOI":"10.1109\/FUZZ-IEEE.2012.6251215"},{"issue":"Supplement 1","key":"9387_CR9","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1080\/18756891.2013.818190","volume":"6","author":"P Cingolani","year":"2013","unstructured":"Cingolani P, Alcal-Fdez J (2013) jFuzzyLogic: a Java library to design fuzzy logic controllers according to the standard for fuzzy control programming. Int J Comput Intell Syst 6(Supplement 1):61\u201375","journal-title":"Int J Comput Intell Syst"},{"key":"9387_CR10","doi-asserted-by":"crossref","unstructured":"De Caro A, Iovino V (2011) jPBC: Java pairing based cryptography. In: 2011 IEEE symposium on computers and communications (ISCC)","DOI":"10.1109\/ISCC.2011.5983948"},{"key":"9387_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ins.2017.03.038","volume":"403\u2013404","author":"Q Huang","year":"2017","unstructured":"Huang Q, Li H (2017) An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks. Inf Sci 403\u2013404:1\u201314","journal-title":"Inf Sci"},{"key":"9387_CR12","unstructured":"Kazemian H (1998) Study of MIMO learning fuzzy controllers for dynamic system applications"},{"issue":"2","key":"9387_CR13","doi-asserted-by":"publisher","first-page":"90","DOI":"10.17781\/P002654","volume":"9","author":"H Kazemian","year":"2020","unstructured":"Kazemian H, Ma Y (2020a) A secure and efficient public key authenticated encryption with multi-keywords search scheme against inside keyword guessing attack. Int J Cyber Secur Digit Forensics 9(2):90\u2013101","journal-title":"Int J Cyber Secur Digit Forensics"},{"key":"9387_CR14","doi-asserted-by":"crossref","unstructured":"Kazemian H, Ma Y (2020b) Fuzzy logic application to searchable cryptography. In: Proceedings of the 21st EANN (Engineering Applications of Neural Networks) 2020 conference, pp 410\u2013422","DOI":"10.1007\/978-3-030-48791-1_32"},{"key":"9387_CR15","doi-asserted-by":"publisher","first-page":"1188","DOI":"10.1016\/j.ecolind.2009.02.006","volume":"9","author":"A Lermontov","year":"2009","unstructured":"Lermontov A, Yokoyama L, Lermontov M, Machado MAS (2009) River quality analysis using fuzzy water quality index: Ribeira do Iguape river watershed, Brazil. Ecol Indic 9:1188\u20131197","journal-title":"Ecol Indic"},{"issue":"3","key":"9387_CR16","doi-asserted-by":"publisher","first-page":"1601","DOI":"10.1007\/s11071-015-1965-9","volume":"80","author":"C-T Li","year":"2015","unstructured":"Li C-T, Lee C-W, Shen J-J (2015) An extended chaotic maps-based keyword search scheme over encrypted data resist outside and inside keyword guessing attacks in cloud storage services. Nonlinear Dyn 80(3):1601\u20131611","journal-title":"Nonlinear Dyn"},{"key":"9387_CR17","unstructured":"Maghrebi H (2019) Deep learning based side channel attacks in practice. Cryptology ePrint Archive, Report 2019\/578"},{"key":"9387_CR18","doi-asserted-by":"crossref","unstructured":"Ma Y, Kazemian H (2018) Trapdoor-indistinguishable secure channel free public key encryption with multi-keywords search (student contributions). In: Proceedings of the 11th international conference on security of information and networks\u2014-SIN18","DOI":"10.1145\/3264437.3264465"},{"issue":"1","key":"9387_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/S0020-7373(75)80002-2","volume":"7","author":"EH Mamdani","year":"1975","unstructured":"Mamdani EH, Assilian S (1975) An experiment in linguistic synthesis with a fuzzy logic controller. Int J Man Mach Stud 7(1):1\u201313","journal-title":"Int J Man Mach Stud"},{"key":"9387_CR20","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1016\/j.ecolind.2008.07.004","volume":"9","author":"A Marchini","year":"2009","unstructured":"Marchini A, Facchinetti T, Mistri M (2009) F-IND: a framework to design fuzzy indices of environmental conditions. Ecol Indic 9:485\u2013496","journal-title":"Ecol Indic"},{"issue":"2","key":"9387_CR21","doi-asserted-by":"publisher","first-page":"1127","DOI":"10.1007\/s11071-018-4413-9","volume":"94","author":"M Noroozi","year":"2018","unstructured":"Noroozi M, Eslami Z, Pakniat N (2018) Comments on a chaos-based public key encryption with keyword search scheme. Nonlinear Dyn 94(2):1127\u20131132","journal-title":"Nonlinear Dyn"},{"issue":"5","key":"9387_CR22","doi-asserted-by":"publisher","first-page":"763","DOI":"10.1016\/j.jss.2009.11.726","volume":"83","author":"H Rhee","year":"2010","unstructured":"Rhee H, Park J, Susilo W, Lee D (2010) Trapdoor security in a searchable public-key encryption scheme with a designated tester. J Syst Softw 83(5):763\u2013771","journal-title":"J Syst Softw"},{"key":"9387_CR23","first-page":"22","volume":"65","author":"J Singh","year":"2006","unstructured":"Singh J, Singh N, Sharma JK (2006) Fuzzy modeling and identification of intelligent control for refrigeration compressor. J Sci Ind Res 65:22\u201330","journal-title":"J Sci Ind Res"},{"key":"9387_CR24","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1109\/TSMC.1985.6313399","volume":"15","author":"T Takagi","year":"1985","unstructured":"Takagi T, Sugeno M (1985) Fuzzy identification of systems and its applications to modeling and control. IEEE Trans Sys Man Cybern 15:116\u2013132","journal-title":"IEEE Trans Sys Man Cybern"},{"key":"9387_CR25","first-page":"163","volume":"6391","author":"Q Tang","year":"2010","unstructured":"Tang Q, Chen L (2010) Public-key encryption with registered keyword search, public key infrastructures, services and applications. EuroPKI2009 6391:163\u2013178","journal-title":"EuroPKI2009"},{"key":"9387_CR26","unstructured":"Voskoglou M (2020) Fuzzy sets, fuzzy logic and their applications"},{"key":"9387_CR27","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/978-3-319-46298-1_17","volume":"9955","author":"T Wang","year":"2016","unstructured":"Wang T, Au M, Wu W (2016) An efficient secure channel free searchable encryption scheme with multiple keywords. Net Syst Secur 9955:251\u2013265","journal-title":"Net Syst Secur"},{"key":"9387_CR28","doi-asserted-by":"crossref","unstructured":"Yau W, Heng S, Goi B (2008) Off-line keyword guessing attacks on recent public key encryption with keyword search schemes. Lecture notes in computer science, pp 100\u2013105","DOI":"10.1007\/978-3-540-69295-9_10"},{"issue":"12","key":"9387_CR29","doi-asserted-by":"publisher","first-page":"2581","DOI":"10.1080\/00207160.2013.778985","volume":"90","author":"W Yau","year":"2013","unstructured":"Yau W, Phan R, Heng S, Goi B (2013) Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester. Int J Comput Math 90(12):2581\u20132587","journal-title":"Int J Comput Math"},{"issue":"1","key":"9387_CR30","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/TSMC.1973.5408575","volume":"SMC\u20133","author":"L Zadeh","year":"1973","unstructured":"Zadeh L (1973) Outline of a new approach to the analysis of complex systems and decision processes. IEEE Trans Syst Man Cybern SMC\u20133(1):28\u201344","journal-title":"IEEE Trans Syst Man Cybern"},{"issue":"2","key":"9387_CR31","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1049\/cje.2018.01.012","volume":"27","author":"X Zhang","year":"2018","unstructured":"Zhang X, Xu C, Xie R, Jin C (2018) Designated cloud server public key encryption with keyword search from lattice in the standard model. Chin J Electron 27(2):304\u2013309","journal-title":"Chin J Electron"}],"container-title":["Evolving Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12530-021-09387-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12530-021-09387-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12530-021-09387-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,13]],"date-time":"2021-09-13T02:20:10Z","timestamp":1631499610000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12530-021-09387-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,24]]},"references-count":31,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,9]]}},"alternative-id":["9387"],"URL":"https:\/\/doi.org\/10.1007\/s12530-021-09387-0","relation":{},"ISSN":["1868-6478","1868-6486"],"issn-type":[{"type":"print","value":"1868-6478"},{"type":"electronic","value":"1868-6486"}],"subject":[],"published":{"date-parts":[[2021,5,24]]},"assertion":[{"value":"30 October 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 May 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 May 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}