Research Article

Secure kNN Computation and Integrity Assurance of Data Outsourcing in the Cloud

Figure 11

Verification time versus cardinality