{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T13:00:07Z","timestamp":1740142807974,"version":"3.37.3"},"reference-count":37,"publisher":"Oxford University Press (OUP)","issue":"4","license":[{"start":{"date-parts":[[2017,10,13]],"date-time":"2017-10-13T00:00:00Z","timestamp":1507852800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/journals\/pages\/about_us\/legal\/notices"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61272074","U1405255"],"award-info":[{"award-number":["61272074","U1405255"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Industrial Science and Technology Foundation","award":["GY2013030"],"award-info":[{"award-number":["GY2013030"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,4,1]]},"DOI":"10.1093\/comjnl\/bxx095","type":"journal-article","created":{"date-parts":[[2017,9,23]],"date-time":"2017-09-23T19:11:23Z","timestamp":1506193883000},"page":"496-511","source":"Crossref","is-referenced-by-count":3,"title":["Secure Top-k Preference Query for Location-based Services in Crowd-outsourcing Environments"],"prefix":"10.1093","volume":"61","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2942-6975","authenticated-orcid":false,"given":"Haiqin","family":"Wu","sequence":"first","affiliation":[{"name":"School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang 212013, P.R. China"}]},{"given":"Liangmin","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang 212013, P.R. China"}]},{"given":"Shunrong","family":"Jiang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang 212013, P.R. China"}]}],"member":"286","published-online":{"date-parts":[[2017,10,13]]},"reference":[{"first-page":"1","year":"2016","author":"Hu","key":"key\n\t\t\t\t20180329074328_bxx095C1"},{"key":"key\n\t\t\t\t20180329074328_bxx095C2","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1109\/TIFS.2015.2478739","article-title":"Designing secure and dependable mobile sensing mechanisms with revenue guarantees","volume":"11","author":"Zhang","year":"2016","journal-title":"IEEE Trans. Inform. Forensics Secur"},{"first-page":"640","year":"2014","author":"Yi","key":"key\n\t\t\t\t20180329074328_bxx095C3"},{"first-page":"279","year":"2014","author":"Tsuda","key":"key\n\t\t\t\t20180329074328_bxx095C4"},{"first-page":"143","year":"2010","author":"Jiang","key":"key\n\t\t\t\t20180329074328_bxx095C5"},{"first-page":"280","year":"2015","author":"Nguyen","key":"key\n\t\t\t\t20180329074328_bxx095C6"},{"first-page":"555","year":"2015","author":"Peng","key":"key\n\t\t\t\t20180329074328_bxx095C7"},{"key":"key\n\t\t\t\t20180329074328_bxx095C8","doi-asserted-by":"crossref","first-page":"1494","DOI":"10.1109\/TKDE.2013.174","article-title":"Authentication of k nearest neighbor query on road networks","volume":"26","author":"Jing","year":"2014","journal-title":"IEEE Trans. Knowl. Eng."},{"first-page":"567","year":"2015","author":"Su","key":"key\n\t\t\t\t20180329074328_bxx095C9"},{"key":"key\n\t\t\t\t20180329074328_bxx095C10","doi-asserted-by":"crossref","first-page":"49","DOI":"10.14778\/2732219.2732224","article-title":"Authenticating top-k queries in location-based services with confidentiality","volume":"7","author":"Chen","year":"2013","journal-title":"Proc. VLDB Endowment"},{"key":"key\n\t\t\t\t20180329074328_bxx095C11","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1109\/TDSC.2014.2309133","article-title":"Secure spatial top-k query processing via untrusted location-based service providers","volume":"12","author":"Zhang","year":"2015","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"key\n\t\t\t\t20180329074328_bxx095C12","doi-asserted-by":"crossref","first-page":"2875","DOI":"10.1109\/ACCESS.2015.2511143","article-title":"Sftopk: secure functional top-k query via untrusted data storage","volume":"3","author":"Tsou","year":"2015","journal-title":"IEEE Access"},{"key":"key\n\t\t\t\t20180329074328_bxx095C13","first-page":"1","article-title":"Efficient and secure top-k query processing on hybrid sensed data","volume":"2016","author":"Wu","year":"2016","journal-title":"Mobile Inform. Syst."},{"first-page":"29","year":"2002","author":"Hacig\u00fcm\u00fcs","key":"key\n\t\t\t\t20180329074328_bxx095C14"},{"first-page":"80","year":"2009","author":"Ku","key":"key\n\t\t\t\t20180329074328_bxx095C15"},{"first-page":"51","year":"2013","author":"Samanthula","key":"key\n\t\t\t\t20180329074328_bxx095C16"},{"key":"key\n\t\t\t\t20180329074328_bxx095C17","doi-asserted-by":"crossref","first-page":"704","DOI":"10.1109\/TIFS.2015.2506145","article-title":"Geometric range search on encrypted spatial data","volume":"11","author":"Wang","year":"2016","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"first-page":"383","year":"2011","author":"Li","key":"key\n\t\t\t\t20180329074328_bxx095C18"},{"first-page":"87","year":"2014","author":"Shen","key":"key\n\t\t\t\t20180329074328_bxx095C19"},{"key":"key\n\t\t\t\t20180329074328_bxx095C20","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1587\/transcom.E98.B.190","article-title":"Achieving efficient cloud search services: Multi-keyword ranked search over encrypted cloud data supporting parallel computing","volume":"98","author":"Fu","year":"2015","journal-title":"IEICE Trans. Commun."},{"key":"key\n\t\t\t\t20180329074328_bxx095C21","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1109\/TPDS.2015.2401003","article-title":"A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data","volume":"27","author":"Xia","year":"2015","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"author":"Elmehdwi","key":"key\n\t\t\t\t20180329074328_bxx095C22","first-page":"664"},{"first-page":"139","year":"2009","author":"Wong","key":"key\n\t\t\t\t20180329074328_bxx095C23"},{"year":"2017","author":"Wu","key":"key\n\t\t\t\t20180329074328_bxx095C24"},{"year":"2017","author":"Zhou","key":"key\n\t\t\t\t20180329074328_bxx095C25"},{"first-page":"301","year":"2014","author":"Lee","key":"key\n\t\t\t\t20180329074328_bxx095C26"},{"first-page":"1017","year":"2015","author":"Niu","key":"key\n\t\t\t\t20180329074328_bxx095C27"},{"key":"key\n\t\t\t\t20180329074328_bxx095C28","doi-asserted-by":"crossref","first-page":"1200","DOI":"10.1109\/TKDE.2013.87","article-title":"Privacy-preserving and content-protecting location based queries","volume":"26","author":"Paulet","year":"2014","journal-title":"IEEE Trans. Knowl. Data Eng."},{"first-page":"420","year":"2006","author":"Narasimha","key":"key\n\t\t\t\t20180329074328_bxx095C29"},{"key":"key\n\t\t\t\t20180329074328_bxx095C30","doi-asserted-by":"crossref","first-page":"802","DOI":"10.14778\/1687627.1687718","article-title":"Scalable verification for outsourced dynamic databases","volume":"2","author":"Pang","year":"2009","journal-title":"Proc. VLDB Endowment"},{"key":"key\n\t\t\t\t20180329074328_bxx095C31","doi-asserted-by":"crossref","first-page":"922","DOI":"10.1109\/TKDE.2014.2350252","article-title":"Authentication of moving top-k spatial keyword queries","volume":"27","author":"Wu","year":"2015","journal-title":"IEEE Trans. Knowl. Data Eng."},{"first-page":"779","year":"2012","author":"Choi","key":"key\n\t\t\t\t20180329074328_bxx095C32"},{"first-page":"72","year":"2014","author":"Jang","key":"key\n\t\t\t\t20180329074328_bxx095C33"},{"first-page":"726","year":"2012","author":"Ma","key":"key\n\t\t\t\t20180329074328_bxx095C34"},{"first-page":"536","year":"2008","author":"Zou","key":"key\n\t\t\t\t20180329074328_bxx095C35"},{"key":"key\n\t\t\t\t20180329074328_bxx095C36","doi-asserted-by":"crossref","first-page":"3286","DOI":"10.1016\/j.ins.2009.05.016","article-title":"The partitioned-layer index: Answering monotone top-k queries using the convex skyline and partitioning-merging technique","volume":"179","author":"Heo","year":"2009","journal-title":"Inf. Sci. (Ny)."},{"key":"key\n\t\t\t\t20180329074328_bxx095C37","doi-asserted-by":"crossref","first-page":"1668","DOI":"10.1109\/TPDS.2012.69","article-title":"A general framework for efficient continuous multidimensional top-k query processing in sensor networks","volume":"23","author":"Jiang","year":"2012","journal-title":"IEEE Trans. Parallel Distrib. Syst."}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/comjnl\/article-pdf\/61\/4\/496\/24509659\/bxx095.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,26]],"date-time":"2023-08-26T08:48:32Z","timestamp":1693039712000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/article\/61\/4\/496\/4539928"}},"subtitle":[],"editor":[{"given":"Keith","family":"Martin","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2017,10,13]]},"references-count":37,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2017,10,13]]},"published-print":{"date-parts":[[2018,4,1]]}},"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxx095","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"type":"print","value":"0010-4620"},{"type":"electronic","value":"1460-2067"}],"subject":[],"published-other":{"date-parts":[[2018,4]]},"published":{"date-parts":[[2017,10,13]]}}}