Skip to main content

Auditable metering with lightweight security

  • Conference paper
  • First Online:
Financial Cryptography (FC 1997)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1318))

Included in the following conference series:

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. S. Ar, J. Cai, Reliable benchmarks using numerical instability. In ACM Symposium on Discrete Algorithms (SODA), pages 34–43, 1993.

    Google Scholar 

  2. T. Berners-Lee and D. Connolly. Hypertext Markup Language-2.0. RFC-1866, SRI Network Information Center, 1995.

    Google Scholar 

  3. W. Bradley, J. B. Lacy and R. Wright. Porting CryptoLib to Java: preliminary performance results. private communication, 1996.

    Google Scholar 

  4. J. Cai, R. Lipton, R. Sedgewick and A. Yao, Towards uncheatable benchmarks. IEEE Structures, pages 2–11, 1993.

    Google Scholar 

  5. W. R. Cheswick and S. M. Bellovin. Firewalls and Internet Security, repelling the wily hacker. Addison-Wesley, 1994.

    Google Scholar 

  6. C. Dwork and M. Naor. Pricing via Processing or Combatting Junk Mail. In Advances in Cryptology—CRYPTO '9g, volume 740 of Lecture Notes in Computer Science, pages 139–147, 1993.

    Google Scholar 

  7. S. Glassman, M. Manasse, M. Abadi, P. Gauthier, and P. Sobalvarro. The Millicent Protocol for Inexpensive Electronic Commerce. In Proc. 4th International World Wide Web Conference, pages 603–618, December 1995. http://www.research.digital.com/SRC/millicent.

    Google Scholar 

  8. K. E. B. Hickman. The SSL Protocol. Technical report, Netscape Communications Corp, 1995.

    Google Scholar 

  9. J. B. Lacy, D. P. Mitchell, and W. M. Schell. CryptoLib: Cryptography in Software. In Proceedings of the 4th USENIX Security Workshop, pages 1–17, October 1993.

    Google Scholar 

  10. A. Schifman E. Rescorla. The Secure HyperText Transfer Protocol. Technical report, Web Transaction Security Working Group, Enterprise Integration Technologies, July 1995.

    Google Scholar 

  11. E. I. Schwartz. Advertising Webonomics 101. Wired, 4(02):74–82, 1996.

    Google Scholar 

  12. Gary Welz. The Internet World Guide to Multimedia on the Internet. http://found.cs.nyu.edu/found.a/CAT/mist/welz/internetmm/index.html; to be published.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Rafael Hirschfeld

Rights and permissions

Reprints and permissions

Copyright information

© 1997 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Franklin, M.K., Malkhi, D. (1997). Auditable metering with lightweight security. In: Hirschfeld, R. (eds) Financial Cryptography. FC 1997. Lecture Notes in Computer Science, vol 1318. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-63594-7_75

Download citation

  • DOI: https://doi.org/10.1007/3-540-63594-7_75

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-63594-9

  • Online ISBN: 978-3-540-69607-0

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics