{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T07:10:36Z","timestamp":1750749036147,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031518256"},{"type":"electronic","value":"9783031518263"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-51826-3_7","type":"book-chapter","created":{"date-parts":[[2024,1,17]],"date-time":"2024-01-17T06:02:00Z","timestamp":1705471320000},"page":"69-81","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Secure and Fast Query Approach for High-Precision Multi-dimensional Satellite Remote Sensing Data"],"prefix":"10.1007","author":[{"given":"Zhengxiang","family":"Cheng","sequence":"first","affiliation":[]},{"given":"Weixuan","family":"Mao","sequence":"additional","affiliation":[]},{"given":"Ruwang","family":"Wen","sequence":"additional","affiliation":[]},{"given":"Zhuolin","family":"Mei","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Jiaoli","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Xiao","family":"Cheng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,18]]},"reference":[{"key":"7_CR1","doi-asserted-by":"publisher","first-page":"4631","DOI":"10.3390\/rs14184631","volume":"14","author":"W Boulila","year":"2022","unstructured":"Boulila, W., Khlifi, M.K., Ammar, A., Koubaa, A., Benjdira, B., Farah, I.R.: A hybrid privacy-preserving deep learning approach for object classification in very high-resolution satellite images. Remote Sensing 14, 4631 (2022)","journal-title":"Remote Sensing"},{"key":"7_CR2","doi-asserted-by":"publisher","first-page":"1814","DOI":"10.1109\/JSTARS.2022.3148139","volume":"15","author":"B Zhang","year":"2022","unstructured":"Zhang, B., et al.: Progress and challenges in intelligent remote sensing satellite systems. IEEE J. Selected Topics Appl. Earth Observ. Remote Sens. 15, 1814\u20131822 (2022)","journal-title":"IEEE J. Selected Topics Appl. Earth Observ. Remote Sens."},{"key":"7_CR3","doi-asserted-by":"publisher","first-page":"5574","DOI":"10.3390\/rs14215574","volume":"14","author":"X Zhang","year":"2022","unstructured":"Zhang, X., Zhang, G., Huang, X., Poslad, S.: Granular content distribution for IoT remote sensing data supporting privacy preservation. Remote Sensing 14, 5574 (2022)","journal-title":"Remote Sensing"},{"key":"7_CR4","doi-asserted-by":"publisher","first-page":"2903","DOI":"10.3390\/rs14122903","volume":"14","author":"Z Wang","year":"2022","unstructured":"Wang, Z., Ma, Y., Zhang, Y., Shang, J.: Review of remote sensing applications in grassland monitoring. Remote Sensing 14, 2903 (2022)","journal-title":"Remote Sensing"},{"key":"7_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jdeveco.2022.102927","volume":"158","author":"JD Michler","year":"2022","unstructured":"Michler, J.D., Josephson, A., Kilic, T., Murray, S.: Privacy protection, measurement error, and the integration of remote sensing and socioeconomic survey data. J. Dev. Econ. 158, 102927 (2022)","journal-title":"J. Dev. Econ."},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Zhang, D.; Shafiq, M.; Wang, L.; Srivastava, G.; Yin, S.: Privacy-preserving remote sensing images recognition based on limited visual cryptography. CAAI Transactions on Intelligence Technology 8(4) (2023)","DOI":"10.1049\/cit2.12164"},{"key":"7_CR7","doi-asserted-by":"publisher","first-page":"115","DOI":"10.3390\/geomatics3010006","volume":"3","author":"L Nduku","year":"2023","unstructured":"Nduku, L., et al.: Global research trends for unmanned aerial vehicle remote sensing application in wheat crop monitoring. Geomatics 3, 115\u2013136 (2023)","journal-title":"Geomatics"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Agrawal, R.; Kiernan, J.; Srikant, R.; Xu, Y. Order preserving encryption for numeric data. In: Proceedings of the Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data, 2004, pp. 563\u2013574 (2004)","DOI":"10.1145\/1007568.1007632"},{"issue":"6","key":"7_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11432-016-0242-7","volume":"60","author":"Y Peng","year":"2017","unstructured":"Peng, Y., Li, H., Cui, J., Zhang, J., Ma, J., Peng, C.: HOPE: improved order preserving encryption with the power to homomorphic operations of ciphertexts. SCIENCE CHINA Inf. Sci. 60(6), 1\u201317 (2017). https:\/\/doi.org\/10.1007\/s11432-016-0242-7","journal-title":"SCIENCE CHINA Inf. Sci."},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Popa, R.A.; Redfield, C.M.; Zeldovich, N.; Balakrishnan, H. CryptDB: Protecting confidentiality with encrypted query processing. In: Proceedings of the Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, pp. 85\u2013100 (2011)","DOI":"10.1145\/2043556.2043566"},{"key":"7_CR11","doi-asserted-by":"publisher","first-page":"31525","DOI":"10.1109\/ACCESS.2018.2847307","volume":"6","author":"H Quan","year":"2018","unstructured":"Quan, H., Wang, B., Zhang, Y., Wu, G.: Efficient and secure top-k queries with top order-preserving encryption. IEEE Access 6, 31525\u201331540 (2018)","journal-title":"IEEE Access"},{"key":"7_CR12","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1016\/j.ins.2022.03.001","volume":"595","author":"Y Zhan","year":"2022","unstructured":"Zhan, Y., Shen, D., Duan, P., Zhang, B., Hong, Z., Wang, B.: MDOPE: efficient multi-dimensional data order preserving encryption scheme. Inf. Sci. 595, 334\u2013343 (2022)","journal-title":"Inf. Sci."},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"David, H.A.; Nagaraja, H.N. Order statistics; John Wiley & Sons (2004)","DOI":"10.1002\/0471667196.ess6023"},{"key":"7_CR14","unstructured":"Wang, P., Ravishankar, C.V.: Secure and efficient range queries on outsourced databases using Rp-trees. In: Proceedings of the 594 2013 IEEE 29th International Conference on Data Engineering (ICDE). IEEE, 2013, pp. 314\u2013325 (2013)"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Hore, B., Mehrotra, S., Tsudik, G.: A privacy-preserving index for range queries. In: Proceedings of the Proceedings of the Thirtieth International Conference on Very Large Data Bases-Volume 30, 2004, pp. 720\u2013731. (2004)","DOI":"10.1016\/B978-012088469-8.50064-4"},{"key":"7_CR16","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1007\/s00778-011-0245-7","volume":"21","author":"B Hore","year":"2012","unstructured":"Hore, B., Mehrotra, S., Canim, M., Kantarcioglu, M.: Secure multidimensional range queries over outsourced data. VLDB J. 21, 333\u2013358 (2012)","journal-title":"VLDB J."},{"key":"7_CR17","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1016\/j.ins.2017.11.065","volume":"432","author":"Z Mei","year":"2018","unstructured":"Mei, Z., et al.: Executing multi-dimensional range query efficiently and flexibly over outsourced ciphertexts in the cloud. Inf. Sci. 432, 79\u201396 (2018)","journal-title":"Inf. Sci."},{"key":"7_CR18","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/65.912717","volume":"15","author":"P Gupta","year":"2001","unstructured":"Gupta, P., McKeown, N.: Algorithms for packet classification. IEEE Network 15, 24\u201332 (2001)","journal-title":"IEEE Network"},{"key":"7_CR19","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1145\/362686.362692","volume":"13","author":"BH Bloom","year":"1970","unstructured":"Bloom, B.H.: Space\/time trade-offs in hash coding with allowable errors. Commun. ACM 13, 422\u2013426 (1970)","journal-title":"Commun. ACM"},{"key":"7_CR20","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1007\/978-3-642-01001-9_13","volume-title":"Advances in Cryptology - EUROCRYPT 2009","author":"A Boldyreva","year":"2009","unstructured":"Boldyreva, A., Chenette, N., Lee, Y., O\u2019Neill, A.: Order-preserving symmetric encryption. In: Joux, A. (ed.) Advances in Cryptology - EUROCRYPT 2009, pp. 224\u2013241. Springer Berlin Heidelberg, Berlin, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-01001-9_13"},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"Hacig\u00fcm\u00fc\u00b8s, H., Iyer, B., Li, C., Mehrotra, S.: Executing SQL over encrypted data in the database-service-provider model. In: Proceedings of the Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data, 2002, pp. 216\u2013227 (2002)","DOI":"10.1145\/564691.564717"},{"key":"7_CR22","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1109\/TDSC.2014.2313863","volume":"11","author":"Y Lee","year":"2014","unstructured":"Lee, Y.: Secure ordered bucketization. IEEE Trans. Dependable Secure Comput. 11, 292\u2013303 (2014)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"7_CR23","doi-asserted-by":"crossref","unstructured":"Wong, W.K., Cheung, D.W.l., Kao, B.; Mamoulis, N.: Secure kNN computation on encrypted databases. In: Proceedings of the Proceedings of the 2009 ACM SIGMOD International Conference on Management of data, 2009, pp. 139\u2013152 (2009)","DOI":"10.1145\/1559845.1559862"},{"key":"7_CR24","doi-asserted-by":"crossref","unstructured":"Guttman, A. R-trees: a dynamic index structure for spatial searching. In: Proceedings of the Proceedings of the 1984 ACM SIGMOD International Conference on Management of Data, 1984, pp. 47\u201357 (1984)","DOI":"10.1145\/971697.602266"},{"key":"7_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"456","DOI":"10.1007\/11496137_31","volume-title":"Applied Cryptography and Network Security","author":"H-Y Lin","year":"2005","unstructured":"Lin, H.-Y., Tzeng, W.-G.: An efficient solution to the millionaires\u2019 problem based on homomorphic encryption. In: Ioannidis, J., Keromytis, A., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 456\u2013466. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11496137_31"},{"key":"7_CR26","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/978-3-319-99807-7_6","volume-title":"Information Security Practice and Experience: 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, Proceedings","author":"J Guo","year":"2018","unstructured":"Guo, J., Wang, J., Zhang, Z., Chen, X.: An almost non-interactive order preserving encryption scheme. In: Chunhua, Su., Kikuchi, H. (eds.) Information Security Practice and Experience: 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, Proceedings, pp. 87\u2013100. Springer International Publishing, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-99807-7_6"}],"container-title":["Lecture Notes in Computer Science","Edge Computing \u2013 EDGE 2023"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-51826-3_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,17]],"date-time":"2024-01-17T06:03:12Z","timestamp":1705471392000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-51826-3_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031518256","9783031518263"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-51826-3_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"18 January 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"EDGE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Edge Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shenzhen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 December 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 December 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"edge2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.servicessociety.org\/edge","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EDAS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"14","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"57% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}