Authenticating query results in edge computing | IEEE Conference Publication | IEEE Xplore