In order to decide on advertisement fees for web servers, Naor and Pinkas introduced (threshold) metering schemes secure against coalitions of corrupt servers and clients. They show that one should be able to detect illegal behavior of clients, i.e., one needs to verify the shares received from clients. Most metering schemes do not offer this feature. But Ogata and Kurosawa pointed out a minor flaw in the extension protocol by Naor and Pinkas providing detection of such illegal behavior and propose a correction. In this paper we extend the linear algebra approach from Nikov et al. in order to build robust unconditionally secure general metering schemes. As a tool to achieve this goal we introduce doubly-labelled matrices and an operation on...
International audienceWith the emergence of cloud computing services, computationally weak devices (...
We introduce a secure architecture called an attested me-ter for advanced metering that supports lar...
Copyright © 2015 ACM. Web services heavily rely on passwords for user authentication. To help users ...
In order to decide on advertisement fees for web servers, Naor and Pinkas introduced (threshold) met...
Abstract. In order to decide on advertisement fees for web servers, Naor and Pinkas introduced (thre...
In order to decide on advertisement fees for web servers, Naor and Pinkas introduced (threshold) met...
The original publication is available at www.springerlink.comWe consider the problem of metering acc...
. We consider an environment in which many servers serve an even larger number of clients (e.g. the ...
In the near future, billing for network services will not only be concerned with time or volume base...
[[abstract]]Since the rapid development of the Internet, many advertisers would want to introduce th...
Current gateway-based metering is not capable of capturing secured traffic because the gateway sits ...
Abstract-Smart grids are replacing traditional power grids and smart meters are one of the key compo...
Privacy-preserving billing protocols are useful in settings where a meter measures user consumption ...
The industry has recognized the risk of cyber- attacks targeting to the advanced metering infrastr...
The industry has recognized the risk of cyber-attacks targeting to the advanced metering infrastruct...
International audienceWith the emergence of cloud computing services, computationally weak devices (...
We introduce a secure architecture called an attested me-ter for advanced metering that supports lar...
Copyright © 2015 ACM. Web services heavily rely on passwords for user authentication. To help users ...
In order to decide on advertisement fees for web servers, Naor and Pinkas introduced (threshold) met...
Abstract. In order to decide on advertisement fees for web servers, Naor and Pinkas introduced (thre...
In order to decide on advertisement fees for web servers, Naor and Pinkas introduced (threshold) met...
The original publication is available at www.springerlink.comWe consider the problem of metering acc...
. We consider an environment in which many servers serve an even larger number of clients (e.g. the ...
In the near future, billing for network services will not only be concerned with time or volume base...
[[abstract]]Since the rapid development of the Internet, many advertisers would want to introduce th...
Current gateway-based metering is not capable of capturing secured traffic because the gateway sits ...
Abstract-Smart grids are replacing traditional power grids and smart meters are one of the key compo...
Privacy-preserving billing protocols are useful in settings where a meter measures user consumption ...
The industry has recognized the risk of cyber- attacks targeting to the advanced metering infrastr...
The industry has recognized the risk of cyber-attacks targeting to the advanced metering infrastruct...
International audienceWith the emergence of cloud computing services, computationally weak devices (...
We introduce a secure architecture called an attested me-ter for advanced metering that supports lar...
Copyright © 2015 ACM. Web services heavily rely on passwords for user authentication. To help users ...