{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T11:13:23Z","timestamp":1740136403618,"version":"3.37.3"},"reference-count":33,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"9","license":[{"start":{"date-parts":[[2015,9,1]],"date-time":"2015-09-01T00:00:00Z","timestamp":1441065600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100004377","name":"PolyU","doi-asserted-by":"publisher","award":["5302\/12E"],"award-info":[{"award-number":["5302\/12E"]}],"id":[{"id":"10.13039\/501100004377","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. on Mobile Comput."],"published-print":{"date-parts":[[2015,9,1]]},"DOI":"10.1109\/tmc.2014.2365203","type":"journal-article","created":{"date-parts":[[2014,10,27]],"date-time":"2014-10-27T18:40:58Z","timestamp":1414435258000},"page":"1806-1819","source":"Crossref","is-referenced-by-count":4,"title":["Efficient Authentication of Continuously Moving &lt;inline-formula&gt;&lt;tex-math&gt;$k$&lt;\/tex-math&gt;&lt;alternatives&gt; &lt;inline-graphic xlink:type=\"simple\" xlink:href=\"yiu-ieq1-2365203.gif\"\/&gt;&lt;\/alternatives&gt;&lt;\/inline-formula&gt;NN Queries"],"prefix":"10.1109","volume":"14","author":[{"given":"Duncan","family":"Yung","sequence":"first","affiliation":[]},{"given":"Yu","family":"Li","sequence":"additional","affiliation":[]},{"given":"Eric","family":"Lo","sequence":"additional","affiliation":[]},{"given":"Man Lung","family":"Yiu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/872757.872812"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2396761.2398441"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1007568.1007619"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2011.5767829"},{"key":"ref10","first-page":"147","article-title":"Proof-infused streams: Enabling authentication of sliding window queries on streams","author":"li","year":"0","journal-title":"Proc Int Conf On Very Large Data Bases"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2063576.2063805"},{"key":"ref12","article-title":"Httpos: Sealing information leaks with browser-side obfuscation of encrypted flows","author":"luo","year":"0","journal-title":"Proc Symp Network and Distributed System Security"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-34805-0_21"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.14778\/1453856.1453973"},{"key":"ref15","doi-asserted-by":"crossref","DOI":"10.1002\/9780470317013","author":"okabe","year":"2000","journal-title":"Spatial Tessellations Concepts and Applications of Voronoi Diagrams"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1066157.1066204"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.14778\/1453856.1453875"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.14778\/1687627.1687718"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02982-0_7"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1567274.1567277"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2213836.2213871"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-008-0113-2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2010.246"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1138394.1138396"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2010.5447914"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1869790.1869839"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1739041.1739114"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.14778\/1453856.1453876"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/375663.375686"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1142473.1142488"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/93597.98741"},{"key":"ref20","first-page":"135","article-title":"CADS: Continuous authentication on data streams","author":"papadopoulos","year":"0","journal-title":"Proc Int Conf On Very Large Data Bases"},{"key":"ref22","first-page":"79","article-title":"K-nearest neighbor search for moving query point","author":"song","year":"0","journal-title":"Proc 7th Symp Spatio-Temporal Database"},{"key":"ref21","first-page":"601","article-title":"Query execution assurance for outsourced databases","author":"sion","year":"0","journal-title":"Proc Int Conf On Very Large Data Bases"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2006.06.018"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/B978-155860869-6\/50033-0"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559849"},{"key":"ref25","first-page":"13","article-title":"Lugrid: Update-tolerant grid-based indexing for moving objects","author":"xiong","year":"0","journal-title":"Proc 7th Int Conf Mobile Data Manage"}],"container-title":["IEEE Transactions on Mobile Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7755\/7175142\/06936886.pdf?arnumber=6936886","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T15:59:12Z","timestamp":1642003152000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6936886\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9,1]]},"references-count":33,"journal-issue":{"issue":"9"},"URL":"https:\/\/doi.org\/10.1109\/tmc.2014.2365203","relation":{},"ISSN":["1536-1233"],"issn-type":[{"type":"print","value":"1536-1233"}],"subject":[],"published":{"date-parts":[[2015,9,1]]}}}