{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T14:59:27Z","timestamp":1648997967346},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2005,7,1]],"date-time":"2005-07-01T00:00:00Z","timestamp":1120176000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des Codes Crypt"],"published-print":{"date-parts":[[2005,7]]},"DOI":"10.1007\/s10623-003-1158-2","type":"journal-article","created":{"date-parts":[[2005,5,11]],"date-time":"2005-05-11T11:43:31Z","timestamp":1115811811000},"page":"5-27","source":"Crossref","is-referenced-by-count":4,"title":["A General Approach to Robust Web Metering"],"prefix":"10.1007","volume":"36","author":[{"given":"S. G.","family":"Barwick","sequence":"first","affiliation":[]},{"given":"Wen-Ai","family":"Jackson","sequence":"additional","affiliation":[]},{"given":"Keith M.","family":"Martin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1158_CR1","doi-asserted-by":"crossref","first-page":"1091","DOI":"10.1016\/S1389-1286(99)00023-7","volume":"31","author":"V. Anupam","year":"1999","journal-title":"Computer Networks."},{"key":"1158_CR2","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1007\/3-540-40026-5_13","volume":"1914","author":"C. Blundo","year":"2000","journal-title":"Proceedings of the DISC Lecture Notes in Computer Science. 1914"},{"key":"1158_CR3","unstructured":"Blundo C., De Bonis A., Masucci B., (1999). Bounds and constructions for metering schemes. Technical Report, Universita di Salerno (1999)"},{"key":"1158_CR4","first-page":"131","volume":"2012","author":"C. Blundo","year":"2001","journal-title":"Selected Areas in Cryptography Lecture Notes in Computer Science."},{"key":"1158_CR5","unstructured":"C. Blundo., B. Masucci, A note on ideal metering schemes. Preprint"},{"key":"1158_CR6","first-page":"105","volume":"9","author":"E.F. Brickell","year":"1989","journal-title":"Journal of Combinatorial Mathematics and Combinatorial Computing"},{"key":"1158_CR7","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1007\/BF00198463","volume":"6","author":"R.M. Capocelli","year":"1993","journal-title":"Journal of Cryptology."},{"key":"1158_CR8","doi-asserted-by":"crossref","unstructured":"T.M. Cover., J. A. Thomas, Elements of Information Theory, John Wiley & Sons (1991)","DOI":"10.1002\/0471200611"},{"key":"1158_CR9","volume-title":"An information theoretical approach to metering schemes, Technical Report, Universita di Salerno","author":"A. DeBonis","year":"2000"},{"key":"1158_CR10","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1007\/BFb0053421","volume":"950","author":"M. Dijk van","year":"1995","journal-title":"Advances in Cryptology \u2013 EUROCRYPT\u2019 94. Lecture Notes in Computer Science."},{"key":"1158_CR11","doi-asserted-by":"crossref","first-page":"237","DOI":"10.3233\/JCS-1998-6402","volume":"4","author":"M. Franklin","year":"1998","journal-title":"Journal of Computer Security. Vol 6."},{"key":"1158_CR12","unstructured":"Hirschfeld J.W.P., Thas J.A. (1991). General Galois Geometries, Oxford University Press"},{"key":"1158_CR13","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1007\/BF01388562","volume":"4","author":"W.-A. Jackson","year":"1994","journal-title":"Designs, Codes and Cryptography."},{"key":"1158_CR14","first-page":"267","volume":"9","author":"W.-A. Jackson","year":"1996","journal-title":"Designs, Codes and Cryptography."},{"key":"1158_CR15","first-page":"127","volume":"54","author":"W.-A. Jackson","year":"1998","journal-title":"Utilitas Mathematica."},{"key":"1158_CR16","doi-asserted-by":"crossref","unstructured":"Jakobsson M., MacKenzie P.D., Stern J.P. (1999). Secure and lightweight advertising on the Web. Proceedings of the 8th World Wide Web Conference","DOI":"10.1016\/S1389-1286(99)00041-9"},{"key":"1158_CR17","unstructured":"M. Lesk, Projections for making money on the Web, Harvard Infrastructure Conference, 23\u201325 January 1997Available at http:\/\/www.lesk.com\/mlesk\/iih\/iih.html"},{"key":"1158_CR18","unstructured":"Manasse M. (1995). The Millicent protocols for electronic commerce In Proceedings of the 1st USENIX Workshop on Electronic Commerce, July 11\u201312, 1995 Available at http:\/\/www.research. digital.com\/SRC\/millicent\/"},{"key":"1158_CR19","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1007\/10722599_5","volume":"1895","author":"B. Masucci","year":"2000","journal-title":"Proceedings of ESORICS Lecture Notes in Computer Science."},{"key":"1158_CR20","unstructured":"Masucci B., Stinson D.R. (2000). Efficient metering schemes with pricing, Technical Report CORR 2000-06, Centre for Applied Cryptographic Research, University of Waterloo"},{"key":"1158_CR21","doi-asserted-by":"crossref","first-page":"576","DOI":"10.1007\/BFb0054155","volume":"140","author":"M. Naor","year":"1998","journal-title":"Advances in Cryptology \u2013 EUROCRYPT\u2019 Lecture Notes in Computer Science."},{"key":"1158_CR22","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1016\/S0169-7552(98)00116-0","volume":"30","author":"M. Naor","year":"1998","journal-title":"Computer Networks."},{"key":"1158_CR23","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-44448-3_29","volume":"1976","author":"W. Ogata","year":"2000","journal-title":"Advances in Cryptology \u2013 ASIACRYPT Lecture Notes in Computer Science."},{"key":"1158_CR24","first-page":"56","volume":"1189","author":"T. Pedersen","year":"1996","journal-title":"Proceeding of the International Workshop Security Protocols, Lecture Notes in Computer Science."},{"key":"1158_CR25","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","volume":"11","author":"A. Shamir","year":"1979","journal-title":"Comm. ACM. Vol. 22"},{"key":"1158_CR26","unstructured":"Simmons G.J. (1992). An introduction to shared secret and or shared control schemes and their applications, In: Contemporary Cryptology, IEEE Press (1992: 441\u2013497"},{"key":"1158_CR27","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1007\/BF00125203","volume":"2","author":"D.R. Stinson","year":"1992","journal-title":"Codes and Cryptography."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-003-1158-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-003-1158-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-003-1158-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T19:50:02Z","timestamp":1559245802000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-003-1158-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,7]]},"references-count":27,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2005,7]]}},"alternative-id":["1158"],"URL":"https:\/\/doi.org\/10.1007\/s10623-003-1158-2","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005,7]]}}}