期刊文献+

A Novel Shopping Protocol for Ubiquitous Commerce

A Novel Shopping Protocol for Ubiquitous Commerce
下载PDF
导出
摘要 Due to the prosperity of ubiquitous computing and mobile communication technologies, the traditional commerce will start changing drastically. A shopping model has shown how the customers make a purchase from before-shopping to post-shopping through a ubiquitous device. However, the ubiquitous computing system gathers the sensitive personal information such as location and credit card information. Therefore, security and privacy have become important issues which should be taken into account in the system. In order to solve these problems, this paper tries to design a helpful and secure ubiquitous shopping protocol which is combined with the shopping model to make it practical, secure, and convenient. Due to the prosperity of ubiquitous computing and mobile communication technologies, the traditional commerce will start changing drastically. A shopping model has shown how the customers make a purchase from before-shopping to post-shopping through a ubiquitous device. However, the ubiquitous computing system gathers the sensitive personal information such as location and credit card information. Therefore, security and privacy have become important issues which should be taken into account in the system. In order to solve these problems, this paper tries to design a helpful and secure ubiquitous shopping protocol which is combined with the shopping model to make it practical, secure, and convenient.
出处 《Journal of Electronic Science and Technology》 CAS 2011年第4期359-363,共5页 电子科技学刊(英文版)
关键词 PAYMENT PRIVACY SECURITY ubiquitous commerce. Payment, privacy, security, ubiquitous commerce.
  • 相关文献

参考文献10

  • 1S. I. Eludiora,F. A. Anifowose."Development of transactions authorization protocol for ubiquitous commerce systems,"[].International Journal of Emerging Sciences.2011
  • 2W. Cheng,J. Li,K. Moore,A. H. Karp."MUPPET: mobile ubiquitous privacy protection for electronic transactions,"[]..2007
  • 3K.-J. Lee,J.-I. Ju,J.-M. Jeong."A payment & receipt business model in U-commerce environment,"[].Proc of the th International Conf on Electronic Commerce.2006
  • 4N. Davies,H. W. Gellersen."Beyond prototypes: challenges in deploying ubiquitous systems,"[].IEEE Pervasive Computing.2002
  • 5Y. Xu,Z. Ma,X. Chen,L. Li."Composite sensor model and security agent to improve privacy of ubiquitous computing,"[].Proc of the st IEEE International Conf on Ubi-Media Computing.2008
  • 6C.-S. Wang,Y.-R. Tzeng."A wireless networking technologies overview over ubiquitous service applications,"[].Proc of the th International Conf on Networked Computing and Advanced Information Management.2008
  • 7H. Wang,Y. Zhang,J. Cao."Access control management for ubiquitous computing,"[].Future Generation Computer Systems.2010
  • 8Mark Weiser.Hot topics:Ubiquitous computing[].IEEE Computer.1993
  • 9M. Weiser."The computer for the 21st century,"[].Scientific American.1992
  • 10C.-X. Qi,Z.-Z. Zhu,L.-T. Zhang."A shopping model in ubiquitous media environment,"[].Proc of International Forum on Information Technology and Applications.2010

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部