期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
Effects of cooperative mechanisms in mobile commerce value chain 被引量:1
1
作者 蒋丽丽 梅姝娥 仲伟俊 《Journal of Southeast University(English Edition)》 EI CAS 2011年第3期335-339,共5页
In order to analyze the effects of different cooperative mechanisms between a mobile device manufacturer and a mobile network operator ( MNO ), a Stackelberg structure is constructed. The manufacturer acts as a lead... In order to analyze the effects of different cooperative mechanisms between a mobile device manufacturer and a mobile network operator ( MNO ), a Stackelberg structure is constructed. The manufacturer acts as a leader, while the MNO acts as a follower, i. e., a traditional retailer. Three cooperative mechanisms are considered: the manufacturer does not invest in developing the propriety function and software to support the infrastructure capacity of the MNO; the manufacturer invests in the development; the MNO offers a subsidy to encourage the manufacturer to invest in development. The results reveal that investing in the development can increase the profits of both the manufacturer and the MNO. Furthermore, if the MNO shares certain investment costs with the manufacturer, the MNO may charge higher prices of mobile connection services and mobile value-added services, and the profits of the two players may be enhanced. 展开更多
关键词 mobile commerce supply chain model PRICING ame theory
下载PDF
Research on Intelligent Mobile Commerce Transaction Security Mechanisms Based on Mobile Agent
2
作者 Weijin Jiang Wei Liu +3 位作者 Haolong Xia Yuhui Xu Dongbo Cao Guo Liang 《Computers, Materials & Continua》 SCIE EI 2020年第12期2543-2555,共13页
In networked mobile commerce network transactions,trust is the prerequisite and key to a smooth transaction.The measurement of trust between entities involves factors such as transaction amount,transaction time,person... In networked mobile commerce network transactions,trust is the prerequisite and key to a smooth transaction.The measurement of trust between entities involves factors such as transaction amount,transaction time,personal income of consumer entities and their risk attitude towards trust,etc.,so it is difficult to accurately calculate quantitatively.In order to find out the essential characteristics of this trust relationship,based on the research background of mobile commerce in the mobile network environment,a dynamic trust mechanism is proposed through the research of trust in the mobile network environment,trust influencing factors and trust mechanism.The calculation model of mobile interactive services based on mobile service business transactions.The model calculates feedback credibility through feedback deviation and feedback robustness,and combines transaction context factors and trust mapping mechanism to judge the seller’s credibility.This model better reflects the degree of influence of subjective factors such as personal preferences and risk attitudes on trust calculations,And the sensitivity of trust algorithms and transaction attributes has been greatly improved.After a large number of experiments and theoretical analysis,this mechanism provides an effective explanation for solving the problem of network trust computing.and provides valuable new ideas for the study of secure transactions in the mobile Internet environment. 展开更多
关键词 mobile Internet mobile commerce dynamic trust model reputation management mobile Agent System(MAS)
下载PDF
Signcryption-Based Key Management for MANETs Applications in Mobile Commerce
3
作者 LI Jingfeng ZHU Yuefei ZHANG Yajuan PAN Heng 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1621-1624,共4页
Mobile commerce uses wireless device and wireless link to result in the transfer of values in exchange of information, services or goods. Wireless mobile ad hoc networks (MANETs) will bring a revolution to the busin... Mobile commerce uses wireless device and wireless link to result in the transfer of values in exchange of information, services or goods. Wireless mobile ad hoc networks (MANETs) will bring a revolution to the business model of mobile commerce if such networks are used as the underlying network technology for mobile commerce. Mobile commerce will remain in a niche market until the security issue is properly addressed. Hence, security is also very important for MANET applications in mobile commerce. Robust key management is one of the most crucial technologies for security of MANETs. In this paper, a new solution for key management is proposed using identity-based (ID-based) signcryption and threshold secret sharing. It enables flexible and efficient key management while respecting the constraints of MANETs. In our solution, each mobile host uses its globally unique identity as its public key. It greatly decreases the computation and storage costs of mobile hosts, as well as communication cost for system key management. 展开更多
关键词 MANETs mobile ad hoe networks) SIGNCRYPTION threshold eryptography mobile commerce
下载PDF
Mobile Commerce User Acceptance Study in China: A Revised UTAUT Model 被引量:12
4
作者 闵庆飞 季绍波 曲刚 《Tsinghua Science and Technology》 SCIE EI CAS 2008年第3期257-264,共8页
User acceptance is one of the key fundamentals for development and success of mobile commerce (m-commerce). Based on the revised unified theory of acceptance and use of technology (UTAUT) model, we described a the... User acceptance is one of the key fundamentals for development and success of mobile commerce (m-commerce). Based on the revised unified theory of acceptance and use of technology (UTAUT) model, we described a theoretical framework that incorporates the unique characteristics of m-commerce to enhance our understanding of m-commerce acceptance and usage in China. The revised UTAUT includes the characteristics of m-commerce, inclusion and consideration of information system user satisfaction theory, and Chinese culture and context. 展开更多
关键词 mobile commerce user acceptance unified theory of acceptance and use of technology
原文传递
An efficient trust negotiation strategy towards the resource-limited mobile commerce environment 被引量:1
5
作者 Bailing LIU Yanhui LI +1 位作者 Bing ZENG Chao LEI 《Frontiers of Computer Science》 SCIE EI CSCD 2016年第3期543-558,共16页
Automated trust negotiation (ATN) offers an at- tractive means for trust establishments, which establishes mu- tual trust among strangers wishing to share resources or con- duct business, but it comes at the cost of... Automated trust negotiation (ATN) offers an at- tractive means for trust establishments, which establishes mu- tual trust among strangers wishing to share resources or con- duct business, but it comes at the cost of non-trivial computa- tion and communication overheads. The deployment of ATN strategies on a resource-constrained mobile device may lead to user-obstructive latency for operations. In this paper, we propose a trust negotiation strategy called trust target Petri nets negotiation strategy (TPNNS). It highly reduces the ne- gotiation latency in the mobile device compared with other negotiation strategies, since it considers all the alternative re- sponses at each step and chooses the best one. TPNNS sup- ports cycle avoidance and employs skipped TPN which is a new approach presented in this paper. What is more, it is complete and ensures no irrelevant credentials are disclosed during the trust negotiation. 展开更多
关键词 automated trust negotiation mobile commerce negotiation strategy Petri net
原文传递
mobile electronic commerce in China
6
作者 Li Taotao Bao Lili 《International English Education Research》 2014年第8期15-16,共2页
This paper, combined with the main feature, function, market effect, development and current situation of ME-commerce in china. analyses the problems of ME-commerce and presents the feasible countermeasure as well as ... This paper, combined with the main feature, function, market effect, development and current situation of ME-commerce in china. analyses the problems of ME-commerce and presents the feasible countermeasure as well as the development plan. 展开更多
关键词 Electronic commerce (E-commerce the mobile electronic commerce (ME-commerce
下载PDF
High Efficiency and Light Mobile Electronic Business System Based on Mobile Agent Middleware 被引量:1
7
作者 张云勇 刘锦德 《Journal of Electronic Science and Technology of China》 2004年第1期43-46,共4页
Mobile Network technology has been being the research focus during the 1990’s. The middleware technology is imported for the sake of running distributed transaction smoothly. In this paper, a mobile agent based middl... Mobile Network technology has been being the research focus during the 1990’s. The middleware technology is imported for the sake of running distributed transaction smoothly. In this paper, a mobile agent based middleware high efficiency mobile electronic business oriented middleware (HEMEBOM) is designed and implemented based on the requirement and background of collaborative electronic business. Its architecture, elements and excellent properties are mainly focused. Then high efficiency mobile electronic business system μMcommerce is built using HEMEBOM. 展开更多
关键词 B2B electronic business MIDDLEWARE mobile agent real-time information push lightweight mobile commerce
下载PDF
Secure Bluetooth for Trusted m-Commerce
8
作者 Pasquale Stirparo Jan Loschner 《International Journal of Communications, Network and System Sciences》 2013年第6期277-288,共12页
Our today’s world is becoming digital and mobile. Exploiting the advantages of wireless communication protocols is not only for telecommunication purposes, but also for payments, interaction with intelligent vehicles... Our today’s world is becoming digital and mobile. Exploiting the advantages of wireless communication protocols is not only for telecommunication purposes, but also for payments, interaction with intelligent vehicles, etc. One of the most widespread wireless capabilities is the Bluetooth protocol. Just in 2010, 906 million mobile Bluetooth enabled phones had been sold, and in 2011, there were more than 40 million Bluetooth enabled health and medical devices on the market. Still in 2011, one third of all new vehicles produced worldwide included Bluetooth technology. Security and privacy protection is key in the digital world of today. There are security and privacy risks such as device tracking, communication eavesdropping, etc., which may come from improper Bluetooth implementation with very severe consequences for the users. The objective of this paper is to analyze the usage of Bluetooth in m-commerce and m-payment fields. The steps undertaken in this paper in order to come to a proposal for a secure architecture are the analysis of the state of the art of the relevant specifications, the existing risks and the known vulnerabilities the related known attacks. Therefore, we give first an overview of the general characteristics of Bluetooth technology today, going deeper in the analysis of Bluetooth stack’s layers and the security features offered by the specifications. After this analysis of the specifications, we study how known vulnerabilities have been exploited with a comprehensive list of known attacks, which poses serious threats for the users. With all these elements as background, we conclude the paper proposing a design for Secure Architecture for Bluetooth-Enhanced Mobile “Smart” Commerce Environments. 展开更多
关键词 BLUETOOTH mobile Security mobile commerce PRIVACY
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部