The concept of the e-marketplace is introduced.Considering a supply chain with a single manufacturer who sells a single item in an e-marketplace,an analytical model for the use of the e-marketplace in a supply chain i...The concept of the e-marketplace is introduced.Considering a supply chain with a single manufacturer who sells a single item in an e-marketplace,an analytical model for the use of the e-marketplace in a supply chain is provided.Assuming the market demand is stochastic and price-dependent,the conditions under which the manufacturer and the e-marketplace owner share the market in equilibrium is developed.The existence and uniqueness of the optimal selling price,quantity and transaction percentage are proved.An integrated supply chain is put forward,and then the efficiency of supply chain coordination is studied by comparing the integrated supply chain with the decentralized supply chain.To gain further insights on the theoretical models,extensive simulations are then carried out.展开更多
In the environment of e-commerce, agents in automated negotiation should share common concept of what they are bargaining and a rule of how to bargain. State of the art overviews of automated negotiation is given. The...In the environment of e-commerce, agents in automated negotiation should share common concept of what they are bargaining and a rule of how to bargain. State of the art overviews of automated negotiation is given. The main barriers to automated negotiation such as protocol and ontology are discussed. Then, a model of automated negotiation is presented with the ontologies of roles and goods described by web ontology language (OWL), the proposal strategies based on the information sets, and a set of rules for agent interaction. In this model, agents coming from different organizations can negotiate automatically based on common ontologies defined by OWL and formal protocol. This makes it possible for the automated negotiation to be performed in an open environment such as Internet, not merely in a closed system.展开更多
As more business is conduced over the Internet, the fair exchange problem assumes increasing importance. However, the problem of multi-party fair exchange has not been studied as widely as the more fundamental problem...As more business is conduced over the Internet, the fair exchange problem assumes increasing importance. However, the problem of multi-party fair exchange has not been studied as widely as the more fundamental problem of 2-party fair exchange. Recently, Franklin arid Tsudik proposed two protocols for n-party multi-item exchange on FC'98, SUCEX-1 and SUCES-2. This paper first gives an attack on the proposed protocol SUCEX-1, then presents two protocols for multi-item exchange, one is an improved protocol of SUCEX-1, another is the extension of protocol SUCEX-2.展开更多
The security of electronic payment is one discusses the secure mechanism and transaction process of the key problems in electronic commerce. This paper of the two electronic payment protocols SSL and SET, and presents...The security of electronic payment is one discusses the secure mechanism and transaction process of the key problems in electronic commerce. This paper of the two electronic payment protocols SSL and SET, and presents the differences between them on security, function and practicality. SSL takes an active role in current electronic payment. With high security and perfect specifications, however, SET isn't widely used at present because of its complexity. But it will change in the future.展开更多
A multi-party quantum secret sharing protocol using two entangled states, φ0〉 = 1/√2 (1+)n + 1-)n) and (φ1)1) =1/√2 (1+)n -1-〉n), is proposed and analyzed. In this protocol, without requiring to gen...A multi-party quantum secret sharing protocol using two entangled states, φ0〉 = 1/√2 (1+)n + 1-)n) and (φ1)1) =1/√2 (1+)n -1-〉n), is proposed and analyzed. In this protocol, without requiring to generate any photon or do any local unitary operation, an agent can obtain a shadow of the secret key by simply performing a measurement of single photon. Furthermore, the security of the protocol is analyzed. It shows that no agent can obtain the manager's secret without the help of the other agents, and any eavesdropper will be detected if he/she tries to steal the manager's secret under ideal or noisy quantum channels.展开更多
We usually decide to accept or reject the offer based on the utility function in the traditional automatic negotiation of E-commerce so that we reject the offers whose utility is lower than a specified value. Here we ...We usually decide to accept or reject the offer based on the utility function in the traditional automatic negotiation of E-commerce so that we reject the offers whose utility is lower than a specified value. Here we evaluate the acceptability based on the fuzzy set theory and the membership function. Since different issues have different effect on the negotiators, we state the combined concession in the multi-issue negotiation for the negotiators. We put forward a more practical negotiation model than the traditional negotiation model and give an example of its application in E-commerce.展开更多
基金The National Key Technology R&D Program of China during the11th Five-Year Plan Period(No.2006BAH02A06)the Program Project of Humanity and Social Science of Ministry of Education in China(No.06JA630012)
文摘The concept of the e-marketplace is introduced.Considering a supply chain with a single manufacturer who sells a single item in an e-marketplace,an analytical model for the use of the e-marketplace in a supply chain is provided.Assuming the market demand is stochastic and price-dependent,the conditions under which the manufacturer and the e-marketplace owner share the market in equilibrium is developed.The existence and uniqueness of the optimal selling price,quantity and transaction percentage are proved.An integrated supply chain is put forward,and then the efficiency of supply chain coordination is studied by comparing the integrated supply chain with the decentralized supply chain.To gain further insights on the theoretical models,extensive simulations are then carried out.
基金The National Natural Science Foundation of China(No.70171011).
文摘In the environment of e-commerce, agents in automated negotiation should share common concept of what they are bargaining and a rule of how to bargain. State of the art overviews of automated negotiation is given. The main barriers to automated negotiation such as protocol and ontology are discussed. Then, a model of automated negotiation is presented with the ontologies of roles and goods described by web ontology language (OWL), the proposal strategies based on the information sets, and a set of rules for agent interaction. In this model, agents coming from different organizations can negotiate automatically based on common ontologies defined by OWL and formal protocol. This makes it possible for the automated negotiation to be performed in an open environment such as Internet, not merely in a closed system.
基金Supported by the National Natural Science Foundation of China(No.60173032,No.69973031)
文摘As more business is conduced over the Internet, the fair exchange problem assumes increasing importance. However, the problem of multi-party fair exchange has not been studied as widely as the more fundamental problem of 2-party fair exchange. Recently, Franklin arid Tsudik proposed two protocols for n-party multi-item exchange on FC'98, SUCEX-1 and SUCES-2. This paper first gives an attack on the proposed protocol SUCEX-1, then presents two protocols for multi-item exchange, one is an improved protocol of SUCEX-1, another is the extension of protocol SUCEX-2.
文摘The security of electronic payment is one discusses the secure mechanism and transaction process of the key problems in electronic commerce. This paper of the two electronic payment protocols SSL and SET, and presents the differences between them on security, function and practicality. SSL takes an active role in current electronic payment. With high security and perfect specifications, however, SET isn't widely used at present because of its complexity. But it will change in the future.
基金supported by the National Science Council of the Republic of China,Taiwan,China (Grant No. NSC 98-2221-E-006-097-MY3)
文摘A multi-party quantum secret sharing protocol using two entangled states, φ0〉 = 1/√2 (1+)n + 1-)n) and (φ1)1) =1/√2 (1+)n -1-〉n), is proposed and analyzed. In this protocol, without requiring to generate any photon or do any local unitary operation, an agent can obtain a shadow of the secret key by simply performing a measurement of single photon. Furthermore, the security of the protocol is analyzed. It shows that no agent can obtain the manager's secret without the help of the other agents, and any eavesdropper will be detected if he/she tries to steal the manager's secret under ideal or noisy quantum channels.
文摘We usually decide to accept or reject the offer based on the utility function in the traditional automatic negotiation of E-commerce so that we reject the offers whose utility is lower than a specified value. Here we evaluate the acceptability based on the fuzzy set theory and the membership function. Since different issues have different effect on the negotiators, we state the combined concession in the multi-issue negotiation for the negotiators. We put forward a more practical negotiation model than the traditional negotiation model and give an example of its application in E-commerce.