On the security of metering scheme

  • Huang Lin*
  • , Zhenfu Cao
  • *Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

Abstract

In 2001, Harn and Lin [4] proposed a non-repudiation metering scheme. In this paper, we reveal two security weaknesses in their scheme, which could make the scheme either too inefficient or incapable of presenting the exact visiting number of a server. An improved scheme will be presented in this paper to avoid these weaknesses in the metering scheme.

Original languageEnglish
Pages (from-to)272-275
Number of pages4
JournalComputers and Mathematics with Applications
Volume60
Issue number2
DOIs
StatePublished - Jul 2010
Externally publishedYes

Keywords

  • Analysis
  • Hash function
  • Metering scheme
  • Turnover
  • Weakness

Fingerprint

Dive into the research topics of 'On the security of metering scheme'. Together they form a unique fingerprint.

Cite this