{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:05:32Z","timestamp":1742911532564,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319181196"},{"type":"electronic","value":"9783319181202"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-18120-2_36","type":"book-chapter","created":{"date-parts":[[2015,4,8]],"date-time":"2015-04-08T08:08:06Z","timestamp":1428480486000},"page":"625-640","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Authentication of Reverse k Nearest Neighbor Query"],"prefix":"10.1007","author":[{"given":"Guohui","family":"Li","sequence":"first","affiliation":[]},{"given":"Changyin","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Jianjun","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,4,9]]},"reference":[{"key":"36_CR1","doi-asserted-by":"crossref","unstructured":"Cheema, M.A., Lin, X., Zhang, W., Zhang, Y.: Influence zone: efficiently processing reverse k nearest neighbors queries. In: 2011 IEEE 27th International Conference on Data Engineering (ICDE), pp. 577\u2013588. IEEE (2011)","DOI":"10.1109\/ICDE.2011.5767904"},{"issue":"1","key":"36_CR2","doi-asserted-by":"publisher","first-page":"1138","DOI":"10.14778\/1687627.1687755","volume":"2","author":"MA Cheema","year":"2009","unstructured":"Cheema, M.A., Lin, X., Zhang, Y., Wang, W., Zhang, W.: Lazy updates: An efficient technique to continuously monitoring reverse knn. Proceedings of the VLDB Endowment 2(1), 1138\u20131149 (2009)","journal-title":"Proceedings of the VLDB Endowment"},{"issue":"1","key":"36_CR3","doi-asserted-by":"crossref","first-page":"49","DOI":"10.14778\/2732219.2732224","volume":"7","author":"Q Chen","year":"2014","unstructured":"Chen, Q., Hu, H., Xu, J.: Authenticating top-k queries in location-based services with confidentiality. Proc. of the VLDB Endowment 7(1), 49\u201360 (2014)","journal-title":"Proc. of the VLDB Endowment"},{"issue":"4","key":"36_CR4","doi-asserted-by":"publisher","first-page":"863","DOI":"10.1109\/TKDE.2011.267","volume":"25","author":"L Hu","year":"2013","unstructured":"Hu, L., Ku, W.S., Bakiras, S., Shahabi, C.: Spatial query integrity with voronoi neighbors. IEEE Transactions on Knowledge and Data Engineering 25(4), 863\u2013876 (2013)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"6","key":"36_CR5","doi-asserted-by":"publisher","first-page":"1494","DOI":"10.1109\/TKDE.2013.174","volume":"26","author":"Y Jing","year":"2014","unstructured":"Jing, Y., Hu, L., Ku, W.S., Shahabi, C.: Authentication of k nearest neighbor query on road networks. IEEE Transactions on Knowledge and Data Engineering 26(6), 1494\u20131506 (2014)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"36_CR6","doi-asserted-by":"crossref","unstructured":"Korn, F., Muthukrishnan, S.: Influence sets based on reverse nearest neighbor queries. In: ACM SIGMOD Record, vol. 29, pp. 201\u2013212. ACM (2000)","DOI":"10.1145\/335191.335415"},{"key":"36_CR7","doi-asserted-by":"crossref","unstructured":"Li, F., Hadjieleftheriou, M., Kollios, G., Reyzin, L.: Dynamic authenticated index structures for outsourced databases. In: Proceedings of the 2006 ACM SIGMOD International Conference on Management of Data, pp. 121\u2013132. ACM (2006)","DOI":"10.1145\/1142473.1142488"},{"issue":"6","key":"36_CR8","doi-asserted-by":"publisher","first-page":"1479","DOI":"10.1109\/TKDE.2013.137","volume":"26","author":"X Lin","year":"2014","unstructured":"Lin, X., Xu, J., Hu, H., Lee, W.C.: Authenticating location-based skyline queries in arbitrary subspaces. IEEE Transactions on Knowledge and Data Engineering 26(6), 1479\u20131493 (2014)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"36_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1007\/0-387-34805-0_21","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"RC Merkle","year":"1990","unstructured":"Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218\u2013238. Springer, Heidelberg (1990)"},{"issue":"2","key":"36_CR10","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1145\/1149976.1149977","volume":"2","author":"E Mykletun","year":"2006","unstructured":"Mykletun, E., Narasimha, M., Tsudik, G.: Authentication and integrity in outsourced databases. ACM Transactions on Storage (TOS) 2(2), 107\u2013138 (2006)","journal-title":"ACM Transactions on Storage (TOS)"},{"key":"36_CR11","doi-asserted-by":"crossref","unstructured":"Tao, Y., Papadias, D., Lian, X.: Reverse knn search in arbitrary dimensionality. In: Proceedings of the Thirtieth International Conference on Very Large Data Bases, vol. 30, pp. 744\u2013755. VLDB Endowment (2004)","DOI":"10.1016\/B978-012088469-8.50066-8"},{"key":"36_CR12","unstructured":"Wu, D., Choi, B., Xu, J., Jensen, C.: Authentication of Moving Top-k Spatial Keyword Queries (to appear) (2014)"},{"key":"36_CR13","doi-asserted-by":"crossref","unstructured":"Wu, W., Yang, F., Chan, C.Y., Tan, K.L.: Continuous reverse k-nearest-neighbor monitoring. In: 9th International Conference on Mobile Data Management, MDM 2008, pp. 132\u2013139. IEEE (2008)","DOI":"10.1109\/MDM.2008.31"},{"issue":"1","key":"36_CR14","doi-asserted-by":"publisher","first-page":"1056","DOI":"10.14778\/1453856.1453970","volume":"1","author":"W Wu","year":"2008","unstructured":"Wu, W., Yang, F., Chan, C.Y., Tan, K.L.: Finch: Evaluating reverse k-nearest-neighbor queries on location data. Proceedings of the VLDB Endowment 1(1), 1056\u20131067 (2008)","journal-title":"Proceedings of the VLDB Endowment"},{"key":"36_CR15","unstructured":"Xie, M., Wang, H., Yin, J., Meng, X.: Integrity auditing of outsourced data. In: Proceedings of the 33rd International Conference on Very Large Data Bases, pp. 782\u2013793. VLDB Endowment (2007)"},{"key":"36_CR16","doi-asserted-by":"crossref","unstructured":"Yang, Y., Papadopoulos, S., Papadias, D., Kollios, G.: Spatial outsourcing for location-based services. In: IEEE 24th International Conference on Data Engineering, ICDE 2008, pp. 1082\u20131091. IEEE (2008)","DOI":"10.1109\/ICDE.2008.4497517"},{"issue":"3","key":"36_CR17","doi-asserted-by":"publisher","first-page":"631","DOI":"10.1007\/s00778-008-0113-2","volume":"18","author":"Y Yang","year":"2009","unstructured":"Yang, Y., Papadopoulos, S., Papadias, D., Kollios, G.: Authenticated indexing for outsourced spatial databases. The VLDB Journal, The International Journal on Very Large Data Bases 18(3), 631\u2013648 (2009)","journal-title":"The VLDB Journal, The International Journal on Very Large Data Bases"},{"key":"36_CR18","doi-asserted-by":"crossref","unstructured":"Yiu, M.L., Lo, E., Yung, D.: Authentication of moving knn queries. In: 2011 IEEE 27th International Conference on Data Engineering (ICDE), pp. 565\u2013576. IEEE (2011)","DOI":"10.1109\/ICDE.2011.5767829"},{"key":"36_CR19","doi-asserted-by":"crossref","unstructured":"Yung, D., Lo, E., Yiu, M.L.: Authentication of moving range queries. In: Proceedings of the 21st ACM International Conference on Information and Knowledge Management, pp. 1372\u20131381. ACM (2012)","DOI":"10.1145\/2396761.2398441"}],"container-title":["Lecture Notes in Computer Science","Database Systems for Advanced Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-18120-2_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,21]],"date-time":"2023-02-21T00:08:58Z","timestamp":1676938138000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-18120-2_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319181196","9783319181202"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-18120-2_36","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"9 April 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}