{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,22]],"date-time":"2025-05-22T05:04:46Z","timestamp":1747890286578,"version":"3.41.0"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319181196"},{"type":"electronic","value":"9783319181202"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-18120-2_35","type":"book-chapter","created":{"date-parts":[[2015,4,8]],"date-time":"2015-04-08T08:08:06Z","timestamp":1428480486000},"page":"609-624","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Bichromatic Reverse Nearest Neighbor Query without Information Leakage"],"prefix":"10.1007","author":[{"given":"Lu","family":"Wang","sequence":"first","affiliation":[]},{"given":"Xiaofeng","family":"Meng","sequence":"additional","affiliation":[]},{"given":"Haibo","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Jianliang","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,4,9]]},"reference":[{"key":"35_CR1","doi-asserted-by":"crossref","unstructured":"Tian, F., Gui, X., Yang, P., Zhang, X., Yang, J.: Security analysis for hilbert curve based spatial data privacy-preserving method. In: 10th IEEE International Conference on High Performance Computing and Communications and 2013 IEEE International Conference on Embedded and Ubiquitous Computing, pp. 929\u2013934, Zhangjiajie, China (2013)","DOI":"10.1109\/HPCC.and.EUC.2013.132"},{"issue":"8","key":"35_CR2","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1145\/2240236.2240255","volume":"55","author":"SB Wicker","year":"2012","unstructured":"Wicker, S.B.: The loss of location privacy in the cellular age. Commun. ACM 55(8), 60\u201368 (2012)","journal-title":"Commun. ACM"},{"key":"35_CR3","doi-asserted-by":"crossref","unstructured":"Du, Y.: Privacy-aware RNN query processing on location-based services. In: 8th International Conference on Mobile Data Management, pp. 253\u2013257, Mannheim, Germany (2007)","DOI":"10.1109\/MDM.2007.53"},{"key":"35_CR4","unstructured":"Williams, P., Sion, R.: Usable PIR. In: NDSS, San Diego, California, USA (2008)"},{"key":"35_CR5","doi-asserted-by":"crossref","unstructured":"Kushilevitz, E., Ostrovsky, R.: Replication is NOT needed: SINGLE database, computationally-private information retrieval. In: FOCS, pp. 364\u2013373, Florida, USA (1997)","DOI":"10.1109\/SFCS.1997.646125"},{"key":"35_CR6","doi-asserted-by":"crossref","unstructured":"Papadopoulos, S., Bakiras, S., Papadias, D.: Nearest neighbor search with strong location privacy. In: VLDB, pp. 619\u2013629 (2010)","DOI":"10.14778\/1920841.1920920"},{"key":"35_CR7","doi-asserted-by":"crossref","unstructured":"Ghinita, G., Kalnis, P., Khoshgozaran, A., Shahabi, C., Tan, K.L.: Private queries in location based services: anonymizers are not necessary. In: SIGMOD, pp. 121\u2013132, Vancouver, BC, Canada (2008)","DOI":"10.1145\/1376616.1376631"},{"key":"35_CR8","doi-asserted-by":"crossref","unstructured":"Mouratidis, K., Yiu, M.L.: Shortest path computation with no information leakage. In: VLDB, pp. 692\u2013703, Istanbul, Turkey (2012)","DOI":"10.14778\/2212351.2212352"},{"key":"35_CR9","unstructured":"Stanoi, I., Riedewald, M., Agrawal, D. and Abbadi, A.E.: Discovery of influence sets in frequently updated databases. In: VLDB, pp. 99\u2013108, Roma, Italy (2001)"},{"key":"35_CR10","doi-asserted-by":"crossref","unstructured":"Wong, W.K., Cheung, D.W.L., Kao, B., Mamoulis, N.: Secure kNN computation on encrypted databases. In: SIGMOD, pp. 139\u2013152, Rhode Island, USA (2009)","DOI":"10.1145\/1559845.1559862"},{"key":"35_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/978-3-540-73540-3_14","volume-title":"Advances in Spatial and Temporal Databases","author":"A Khoshgozaran","year":"2007","unstructured":"Khoshgozaran, A., Shahabi, C.: Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy. In: Papadias, D., Zhang, D., Kollios, G. (eds.) SSTD 2007. LNCS, vol. 4605, pp. 239\u2013257. Springer, Heidelberg (2007)"},{"key":"35_CR12","doi-asserted-by":"crossref","unstructured":"Korn, F., Muthukrishnan, S.: Influence sets based on reverse nearest neighbor queries. In: SIGMOD, pp. 201\u2013212, Dallas, Texas, USA (2000)","DOI":"10.1145\/335191.335415"},{"issue":"2","key":"35_CR13","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1109\/JSYST.2010.2047297","volume":"4","author":"QT Tran","year":"2010","unstructured":"Tran, Q.T., Taniar, D., Safar, M.: Bichromatic Reverse Nearest-Neighbor Search in Mobile Systems. J. IEEE SYSTEMS 4(2), 230\u2013242 (2010)","journal-title":"J. IEEE SYSTEMS"},{"key":"35_CR14","doi-asserted-by":"crossref","unstructured":"Kang, J.M., Mokbel, M.F., Shekhar, S., Xia, T. and Zhang, D.: Continuous evaluation of monochromatic and bichromatic reverse nearest neighbors. In: ICDE, pp. 806\u2013815, Istanbul, Turkey (2007)","DOI":"10.1109\/ICDE.2007.367926"},{"key":"35_CR15","doi-asserted-by":"crossref","unstructured":"Chen, S., Jensen, C.S., Lin, D.: A benchmark for evaluating moving object indexes. In: VLDB, pp. 1574\u20131585, New Zealand (2008)","DOI":"10.14778\/1454159.1454229"},{"issue":"6","key":"35_CR16","doi-asserted-by":"publisher","first-page":"965","DOI":"10.1145\/293347.293350","volume":"45","author":"B Chor","year":"1998","unstructured":"Chor, B., Kushilevitz, E., Goldreich, O., Sudan, M.: Private information retrieval. J. ACM 45(6), 965\u2013981 (1998)","journal-title":"J. ACM"}],"container-title":["Lecture Notes in Computer Science","Database Systems for Advanced Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-18120-2_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,22]],"date-time":"2025-05-22T00:10:50Z","timestamp":1747872650000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-18120-2_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319181196","9783319181202"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-18120-2_35","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"9 April 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}