Secure and Efficient Metering
暂无分享,去创建一个
[1] Alfred V. Aho,et al. The Design and Analysis of Computer Algorithms , 1974 .
[2] Adi Shamir,et al. How to share a secret , 1979, CACM.
[3] Larry Carter,et al. Universal Classes of Hash Functions , 1979, J. Comput. Syst. Sci..
[4] Larry Carter,et al. New Hash Functions and Their Use in Authentication and Set Equality , 1981, J. Comput. Syst. Sci..
[5] R. J. McEliece,et al. On sharing secrets and Reed-Solomon codes , 1981, CACM.
[6] Andrew Chi-Chih Yao,et al. How to Generate and Exchange Secrets (Extended Abstract) , 1986, FOCS.
[7] Paul Feldman,et al. A practical scheme for non-interactive verifiable secret sharing , 1987, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987).
[8] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[9] Joe Kilian,et al. Founding crytpography on oblivious transfer , 1988, STOC '88.
[10] Ralph C. Merkle,et al. A Certified Digital Signature , 1989, CRYPTO.
[11] Tal Rabin,et al. Verifiable secret sharing and multiparty protocols with honest majority , 1989, STOC '89.
[12] Yvo Desmedt,et al. Threshold Cryptosystems , 1989, CRYPTO.
[13] Torben P. Pedersen. Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.
[14] Moti Yung,et al. Optimal-resilience proactive public-key cryptosystems , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[15] James E. Pitkow,et al. In Search of Reliable Usage Data on the WWW , 1997, Comput. Networks.
[16] Silvio Micali,et al. An Optimal Probabilistic Protocol for Synchronous Byzantine Agreement , 1997, SIAM J. Comput..
[17] Stanislaw Jarecki,et al. An Efficient Micropayment System Based on Probabilistic Polling , 1997, Financial Cryptography.
[18] Dahlia Malkhi,et al. Auditable metering with lighweight security , 1998 .
[19] Matthew K. Franklin,et al. Auditable Metering with Lightweight Security , 1997, J. Comput. Secur..