1 |
B. Masucci and D. R. Stinson, Efficient metering schemes with pricing, IEEE Trans. Information Theory, vol. 47, no. 7, pp. 2835-2844, Nov. 2001
DOI
ScienceOn
|
2 |
A. Shamir, How to share a secret, Comm. ACM, vol. 22, no. 11, pp. 612-613, Nov. 1979
DOI
ScienceOn
|
3 |
M. Naor and B. Pinkas, Secure and efficient metering, Advances in Cryptology-EuroCrypt '98, Lecture Notes in Computer Science, vol. 1403, pp. 576-590, May. 1998
|
4 |
Soon Seok Kim, Sung Kwon Kim, and Hong Jin Park, New approach for secure and efficient metering in the web advertising, Computational Science and Its Applications-ICCSA 2004, Lecture Notes in Computer Science, vol. 3043, pp. 215-221, May. 2004
|
5 |
V. Nikov, S. Nikova, B. Preneel and J. Vandewalle, Applying general access structure to metering schemes, Proceedings of the International Workshop on Coding and Cryptography (WCC 2003), 2003
|
6 |
M. K. Franklin and D. Ma1khi, Auditable metering with lightweight security, Financial Cryptography'97, Lecture Notes in Computer Science, vol. 1318, pp. 151-160, Feb. 1997
|