Abstract
In 2001, Harn and Lin [4] proposed a non-repudiation metering scheme. In this paper, we reveal two security weaknesses in their scheme, which could make the scheme either too inefficient or incapable of presenting the exact visiting number of a server. An improved scheme will be presented in this paper to avoid these weaknesses in the metering scheme.
| Original language | English |
|---|---|
| Pages (from-to) | 272-275 |
| Number of pages | 4 |
| Journal | Computers and Mathematics with Applications |
| Volume | 60 |
| Issue number | 2 |
| DOIs | |
| State | Published - Jul 2010 |
| Externally published | Yes |
Keywords
- Analysis
- Hash function
- Metering scheme
- Turnover
- Weakness
Fingerprint
Dive into the research topics of 'On the security of metering scheme'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver