Please use this identifier to cite or link to this item:
Title: Authentication of moving range queries
Authors: Yung, D
Lo, E 
Yiu, ML 
Keywords: Authentication
Moving queries
Issue Date: 2012
Source: CIKM '12 Proceedings of the 21st ACM International Conference on Information and Knowledge Management, Hawaii, Oct 29 - Nov 2, 2012, p. 1372-1381 How to cite?
Abstract: A moving range query continuously reports the query result (e.g., restaurants) that are within radius $r$ from a moving query point (e.g., moving tourist). To minimize the communication cost with the mobile clients, a service provider that evaluates moving range queries also returns a safe region that bounds the validity of query results. However, an untrustworthy service provider may report incorrect safe regions to mobile clients. In this paper, we present efficient techniques for authenticating the safe regions of moving range queries. We theoretically proved that our methods for authenticating moving range queries can minimize the data sent between the service provider and the mobile clients. Extensive experiments are carried out using both real and synthetic datasets and results show that our methods incur small communication costs and overhead.
ISBN: 978-1-4503-1156-4
DOI: 10.1145/2396761.2398441
Appears in Collections:Conference Paper

View full-text via PolyU eLinks SFX Query
Show full item record


Last Week
Last month
Citations as of Sep 15, 2018

Page view(s)

Last Week
Last month
Citations as of Sep 17, 2018

Google ScholarTM



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.