{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T07:50:11Z","timestamp":1743061811929,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642029813"},{"type":"electronic","value":"9783642029820"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-02982-0_7","type":"book-chapter","created":{"date-parts":[[2009,6,29]],"date-time":"2009-06-29T01:31:51Z","timestamp":1246239111000},"page":"62-79","source":"Crossref","is-referenced-by-count":11,"title":["Continuous Spatial Authentication"],"prefix":"10.1007","author":[{"given":"Stavros","family":"Papadopoulos","sequence":"first","affiliation":[]},{"given":"Yin","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Spiridon","family":"Bakiras","sequence":"additional","affiliation":[]},{"given":"Dimitris","family":"Papadias","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Babcock, B., Chaudhuri, S., Das, G.: Dynamic Sample Selection for Approximate Query Processing. In: SIGMOD (2003)","DOI":"10.1145\/872757.872822"},{"key":"7_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-03427-9","volume-title":"Computational Geometry: Algorithms and Applications","author":"M. Berg de","year":"1997","unstructured":"de Berg, M., van Kreveld, M., Overmars, M., Schwarzkopf, O.: Computational Geometry: Algorithms and Applications. Springer, Heidelberg (1997)"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Cheng, W., Pang, H., Tan, K.-L.: Authenticating Multi-dimensional Query Results in Data Publishing. DBSec (2006)","DOI":"10.1007\/11805588_5"},{"key":"7_CR4","unstructured":"Crypto++ Library, www.eskimo.com\u00a0weidai\/benchmark.html"},{"issue":"3","key":"7_CR5","doi-asserted-by":"publisher","first-page":"291","DOI":"10.3233\/JCS-2003-11302","volume":"11","author":"P. Devanbu","year":"2003","unstructured":"Devanbu, P., Gertz, M., Martel, C., Stubblebine, S.: Authentic Data Publication Over the Internet. Journal of Computer Security\u00a011(3), 291\u2013314 (2003)","journal-title":"Journal of Computer Security"},{"issue":"1","key":"7_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/310701.310710","volume":"24","author":"V. Datta","year":"1999","unstructured":"Datta, V., Vandermeer, D., Celik, A., Kumar, V.: Broadcast Protocols to Support Efficient Retrieval from Databases by Mobile Users. ACM TODS\u00a024(1), 1\u201379 (1999)","journal-title":"ACM TODS"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Guha, S., Shim, K., Woo, J.: Rehist: Relative Error Histogram Construction Algorithms. In: VLDB (2004)","DOI":"10.1016\/B978-012088469-8\/50029-2"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Getoor, L., Taskar, B., Koller, D.: Selectivity Estimation using Probability Models. In: SIGMOD (2001)","DOI":"10.1145\/375663.375727"},{"key":"7_CR9","unstructured":"Hac\u0131g\u00fcm\u00fc\u015f, H., Iyer, B., Mehrotra, S.: Providing Databases as a Service. In: ICDE (2002)"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Li, F., Hadjieleftheriou, M., Kollios, G., Reyzin, L.: Dynamic Authenticated Index Structures for Outsourced Databases. In: SIGMOD (2006)","DOI":"10.1145\/1142473.1142488"},{"key":"7_CR11","unstructured":"Li, F., Yi, K., Hadjieleftheriou, M., Kollios, G.: Proof-Infused Streams: Enabling Authentication of Sliding Window Queries on Streams. In: VLDB (2007)"},{"key":"7_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1007\/0-387-34805-0_21","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"R. Merkle","year":"1990","unstructured":"Merkle, R.: A Certified Digital Signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 218\u2013238. Springer, Heidelberg (1990)"},{"issue":"3","key":"7_CR13","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1023\/A:1025196714293","volume":"7","author":"M. Mokbel","year":"2003","unstructured":"Mokbel, M., Aref, W., Kamel, I.: Analysis of Multi-Dimensional Space-Filling Curves. GeoInformatica\u00a07(3), 179\u2013209 (2003)","journal-title":"GeoInformatica"},{"issue":"1","key":"7_CR14","first-page":"124","volume":"13","author":"B. Moon","year":"2001","unstructured":"Moon, B., Jagadish, H.V., Faloutsos, C., Saltz, J.H.: Analysis of the Clustering Properties of the Hilbert Space-Filling Curve. TKDE\u00a013(1), 124\u2013141 (2001)","journal-title":"TKDE"},{"key":"7_CR15","unstructured":"National Institute of Standards and Technology. FIPS PUB 180-1: Secure Hash Standard. National Institute of Standards and Technology (1995)"},{"key":"7_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1007\/11733836_30","volume-title":"Database Systems for Advanced Applications","author":"M. Narasimha","year":"2006","unstructured":"Narasimha, M., Tsudik, G.: Authentication of Outsourced Databases Using Signature Aggregation and Chaining. In: Li Lee, M., Tan, K.-L., Wuwongse, V. (eds.) DASFAA 2006. LNCS, vol.\u00a03882, pp. 420\u2013436. Springer, Heidelberg (2006)"},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"Pang, H., Jain, A., Ramamritham, K., Tan, K.-L.: Verifying Completeness of Relational Query Results in Data Publishing. In: SIGMOD (2005)","DOI":"10.1145\/1066157.1066204"},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"Pang, H., Tan, K.-L.: Authenticating Query Results in Edge Computing. In: ICDE (2004)","DOI":"10.1109\/ICDE.2004.1320027"},{"key":"7_CR19","unstructured":"Papadopoulos, S., Yang, Y., Papadias, D.: CADS: Continuous Authentication on Data Streams. In: VLDB (2007)"},{"issue":"2","key":"7_CR20","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: A method for Obtaining Digital Signatures and Public-key Cryptosystems. Communications of the ACM\u00a021(2), 120\u2013126 (1978)","journal-title":"Communications of the ACM"},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"Yang, Y., Papadopoulos, S., Papadias, D., Kollios, G.: Spatial Outsourcing for Location-based Services. In: ICDE (2008)","DOI":"10.1109\/ICDE.2008.4497517"}],"container-title":["Lecture Notes in Computer Science","Advances in Spatial and Temporal Databases"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-02982-0_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T23:57:51Z","timestamp":1558396671000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-02982-0_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642029813","9783642029820"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-02982-0_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}