Auditable metering with lightweight security

  • Matthew K. Franklin
  • Dahlia Malkhi
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1318)


Timing Function Internet Service Provider Price Function Timing Scheme Visit Record 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    S. Ar, J. Cai, Reliable benchmarks using numerical instability. In ACM Symposium on Discrete Algorithms (SODA), pages 34–43, 1993.Google Scholar
  2. 2.
    T. Berners-Lee and D. Connolly. Hypertext Markup Language-2.0. RFC-1866, SRI Network Information Center, 1995.Google Scholar
  3. 3.
    W. Bradley, J. B. Lacy and R. Wright. Porting CryptoLib to Java: preliminary performance results. private communication, 1996.Google Scholar
  4. 4.
    J. Cai, R. Lipton, R. Sedgewick and A. Yao, Towards uncheatable benchmarks. IEEE Structures, pages 2–11, 1993.Google Scholar
  5. 5.
    W. R. Cheswick and S. M. Bellovin. Firewalls and Internet Security, repelling the wily hacker. Addison-Wesley, 1994.Google Scholar
  6. 6.
    C. Dwork and M. Naor. Pricing via Processing or Combatting Junk Mail. In Advances in Cryptology—CRYPTO '9g, volume 740 of Lecture Notes in Computer Science, pages 139–147, 1993.Google Scholar
  7. 7.
    S. Glassman, M. Manasse, M. Abadi, P. Gauthier, and P. Sobalvarro. The Millicent Protocol for Inexpensive Electronic Commerce. In Proc. 4th International World Wide Web Conference, pages 603–618, December 1995. Scholar
  8. 8.
    K. E. B. Hickman. The SSL Protocol. Technical report, Netscape Communications Corp, 1995.Google Scholar
  9. 9.
    J. B. Lacy, D. P. Mitchell, and W. M. Schell. CryptoLib: Cryptography in Software. In Proceedings of the 4th USENIX Security Workshop, pages 1–17, October 1993.Google Scholar
  10. 10.
    A. Schifman E. Rescorla. The Secure HyperText Transfer Protocol. Technical report, Web Transaction Security Working Group, Enterprise Integration Technologies, July 1995.Google Scholar
  11. 11.
    E. I. Schwartz. Advertising Webonomics 101. Wired, 4(02):74–82, 1996.Google Scholar
  12. 12.
    Gary Welz. The Internet World Guide to Multimedia on the Internet.; to be published.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1997

Authors and Affiliations

  • Matthew K. Franklin
    • 1
  • Dahlia Malkhi
    • 1
  1. 1.AT&T Labs - ResearchMurray HillUSA

Personalised recommendations