In order to analyze the effects of different cooperative mechanisms between a mobile device manufacturer and a mobile network operator ( MNO ), a Stackelberg structure is constructed. The manufacturer acts as a lead...In order to analyze the effects of different cooperative mechanisms between a mobile device manufacturer and a mobile network operator ( MNO ), a Stackelberg structure is constructed. The manufacturer acts as a leader, while the MNO acts as a follower, i. e., a traditional retailer. Three cooperative mechanisms are considered: the manufacturer does not invest in developing the propriety function and software to support the infrastructure capacity of the MNO; the manufacturer invests in the development; the MNO offers a subsidy to encourage the manufacturer to invest in development. The results reveal that investing in the development can increase the profits of both the manufacturer and the MNO. Furthermore, if the MNO shares certain investment costs with the manufacturer, the MNO may charge higher prices of mobile connection services and mobile value-added services, and the profits of the two players may be enhanced.展开更多
In networked mobile commerce network transactions,trust is the prerequisite and key to a smooth transaction.The measurement of trust between entities involves factors such as transaction amount,transaction time,person...In networked mobile commerce network transactions,trust is the prerequisite and key to a smooth transaction.The measurement of trust between entities involves factors such as transaction amount,transaction time,personal income of consumer entities and their risk attitude towards trust,etc.,so it is difficult to accurately calculate quantitatively.In order to find out the essential characteristics of this trust relationship,based on the research background of mobile commerce in the mobile network environment,a dynamic trust mechanism is proposed through the research of trust in the mobile network environment,trust influencing factors and trust mechanism.The calculation model of mobile interactive services based on mobile service business transactions.The model calculates feedback credibility through feedback deviation and feedback robustness,and combines transaction context factors and trust mapping mechanism to judge the seller’s credibility.This model better reflects the degree of influence of subjective factors such as personal preferences and risk attitudes on trust calculations,And the sensitivity of trust algorithms and transaction attributes has been greatly improved.After a large number of experiments and theoretical analysis,this mechanism provides an effective explanation for solving the problem of network trust computing.and provides valuable new ideas for the study of secure transactions in the mobile Internet environment.展开更多
Mobile commerce uses wireless device and wireless link to result in the transfer of values in exchange of information, services or goods. Wireless mobile ad hoc networks (MANETs) will bring a revolution to the busin...Mobile commerce uses wireless device and wireless link to result in the transfer of values in exchange of information, services or goods. Wireless mobile ad hoc networks (MANETs) will bring a revolution to the business model of mobile commerce if such networks are used as the underlying network technology for mobile commerce. Mobile commerce will remain in a niche market until the security issue is properly addressed. Hence, security is also very important for MANET applications in mobile commerce. Robust key management is one of the most crucial technologies for security of MANETs. In this paper, a new solution for key management is proposed using identity-based (ID-based) signcryption and threshold secret sharing. It enables flexible and efficient key management while respecting the constraints of MANETs. In our solution, each mobile host uses its globally unique identity as its public key. It greatly decreases the computation and storage costs of mobile hosts, as well as communication cost for system key management.展开更多
User acceptance is one of the key fundamentals for development and success of mobile commerce (m-commerce). Based on the revised unified theory of acceptance and use of technology (UTAUT) model, we described a the...User acceptance is one of the key fundamentals for development and success of mobile commerce (m-commerce). Based on the revised unified theory of acceptance and use of technology (UTAUT) model, we described a theoretical framework that incorporates the unique characteristics of m-commerce to enhance our understanding of m-commerce acceptance and usage in China. The revised UTAUT includes the characteristics of m-commerce, inclusion and consideration of information system user satisfaction theory, and Chinese culture and context.展开更多
Automated trust negotiation (ATN) offers an at- tractive means for trust establishments, which establishes mu- tual trust among strangers wishing to share resources or con- duct business, but it comes at the cost of...Automated trust negotiation (ATN) offers an at- tractive means for trust establishments, which establishes mu- tual trust among strangers wishing to share resources or con- duct business, but it comes at the cost of non-trivial computa- tion and communication overheads. The deployment of ATN strategies on a resource-constrained mobile device may lead to user-obstructive latency for operations. In this paper, we propose a trust negotiation strategy called trust target Petri nets negotiation strategy (TPNNS). It highly reduces the ne- gotiation latency in the mobile device compared with other negotiation strategies, since it considers all the alternative re- sponses at each step and chooses the best one. TPNNS sup- ports cycle avoidance and employs skipped TPN which is a new approach presented in this paper. What is more, it is complete and ensures no irrelevant credentials are disclosed during the trust negotiation.展开更多
This paper, combined with the main feature, function, market effect, development and current situation of ME-commerce in china. analyses the problems of ME-commerce and presents the feasible countermeasure as well as ...This paper, combined with the main feature, function, market effect, development and current situation of ME-commerce in china. analyses the problems of ME-commerce and presents the feasible countermeasure as well as the development plan.展开更多
Mobile Network technology has been being the research focus during the 1990’s. The middleware technology is imported for the sake of running distributed transaction smoothly. In this paper, a mobile agent based middl...Mobile Network technology has been being the research focus during the 1990’s. The middleware technology is imported for the sake of running distributed transaction smoothly. In this paper, a mobile agent based middleware high efficiency mobile electronic business oriented middleware (HEMEBOM) is designed and implemented based on the requirement and background of collaborative electronic business. Its architecture, elements and excellent properties are mainly focused. Then high efficiency mobile electronic business system μMcommerce is built using HEMEBOM.展开更多
Our today’s world is becoming digital and mobile. Exploiting the advantages of wireless communication protocols is not only for telecommunication purposes, but also for payments, interaction with intelligent vehicles...Our today’s world is becoming digital and mobile. Exploiting the advantages of wireless communication protocols is not only for telecommunication purposes, but also for payments, interaction with intelligent vehicles, etc. One of the most widespread wireless capabilities is the Bluetooth protocol. Just in 2010, 906 million mobile Bluetooth enabled phones had been sold, and in 2011, there were more than 40 million Bluetooth enabled health and medical devices on the market. Still in 2011, one third of all new vehicles produced worldwide included Bluetooth technology. Security and privacy protection is key in the digital world of today. There are security and privacy risks such as device tracking, communication eavesdropping, etc., which may come from improper Bluetooth implementation with very severe consequences for the users. The objective of this paper is to analyze the usage of Bluetooth in m-commerce and m-payment fields. The steps undertaken in this paper in order to come to a proposal for a secure architecture are the analysis of the state of the art of the relevant specifications, the existing risks and the known vulnerabilities the related known attacks. Therefore, we give first an overview of the general characteristics of Bluetooth technology today, going deeper in the analysis of Bluetooth stack’s layers and the security features offered by the specifications. After this analysis of the specifications, we study how known vulnerabilities have been exploited with a comprehensive list of known attacks, which poses serious threats for the users. With all these elements as background, we conclude the paper proposing a design for Secure Architecture for Bluetooth-Enhanced Mobile “Smart” Commerce Environments.展开更多
文摘In order to analyze the effects of different cooperative mechanisms between a mobile device manufacturer and a mobile network operator ( MNO ), a Stackelberg structure is constructed. The manufacturer acts as a leader, while the MNO acts as a follower, i. e., a traditional retailer. Three cooperative mechanisms are considered: the manufacturer does not invest in developing the propriety function and software to support the infrastructure capacity of the MNO; the manufacturer invests in the development; the MNO offers a subsidy to encourage the manufacturer to invest in development. The results reveal that investing in the development can increase the profits of both the manufacturer and the MNO. Furthermore, if the MNO shares certain investment costs with the manufacturer, the MNO may charge higher prices of mobile connection services and mobile value-added services, and the profits of the two players may be enhanced.
基金The author is very grateful for the financial support of the new retail virtual reality technology(2017TP1026)of the key laboratory in Hunan Province.
文摘In networked mobile commerce network transactions,trust is the prerequisite and key to a smooth transaction.The measurement of trust between entities involves factors such as transaction amount,transaction time,personal income of consumer entities and their risk attitude towards trust,etc.,so it is difficult to accurately calculate quantitatively.In order to find out the essential characteristics of this trust relationship,based on the research background of mobile commerce in the mobile network environment,a dynamic trust mechanism is proposed through the research of trust in the mobile network environment,trust influencing factors and trust mechanism.The calculation model of mobile interactive services based on mobile service business transactions.The model calculates feedback credibility through feedback deviation and feedback robustness,and combines transaction context factors and trust mapping mechanism to judge the seller’s credibility.This model better reflects the degree of influence of subjective factors such as personal preferences and risk attitudes on trust calculations,And the sensitivity of trust algorithms and transaction attributes has been greatly improved.After a large number of experiments and theoretical analysis,this mechanism provides an effective explanation for solving the problem of network trust computing.and provides valuable new ideas for the study of secure transactions in the mobile Internet environment.
基金Supported by the National Natural Science Foun-dation of China (60473021 ,60503012)the Natural Science Foun-dation of Henan Province (511010900)
文摘Mobile commerce uses wireless device and wireless link to result in the transfer of values in exchange of information, services or goods. Wireless mobile ad hoc networks (MANETs) will bring a revolution to the business model of mobile commerce if such networks are used as the underlying network technology for mobile commerce. Mobile commerce will remain in a niche market until the security issue is properly addressed. Hence, security is also very important for MANET applications in mobile commerce. Robust key management is one of the most crucial technologies for security of MANETs. In this paper, a new solution for key management is proposed using identity-based (ID-based) signcryption and threshold secret sharing. It enables flexible and efficient key management while respecting the constraints of MANETs. In our solution, each mobile host uses its globally unique identity as its public key. It greatly decreases the computation and storage costs of mobile hosts, as well as communication cost for system key management.
基金the National Natural Science Foundation of China (No. 70602032)
文摘User acceptance is one of the key fundamentals for development and success of mobile commerce (m-commerce). Based on the revised unified theory of acceptance and use of technology (UTAUT) model, we described a theoretical framework that incorporates the unique characteristics of m-commerce to enhance our understanding of m-commerce acceptance and usage in China. The revised UTAUT includes the characteristics of m-commerce, inclusion and consideration of information system user satisfaction theory, and Chinese culture and context.
文摘Automated trust negotiation (ATN) offers an at- tractive means for trust establishments, which establishes mu- tual trust among strangers wishing to share resources or con- duct business, but it comes at the cost of non-trivial computa- tion and communication overheads. The deployment of ATN strategies on a resource-constrained mobile device may lead to user-obstructive latency for operations. In this paper, we propose a trust negotiation strategy called trust target Petri nets negotiation strategy (TPNNS). It highly reduces the ne- gotiation latency in the mobile device compared with other negotiation strategies, since it considers all the alternative re- sponses at each step and chooses the best one. TPNNS sup- ports cycle avoidance and employs skipped TPN which is a new approach presented in this paper. What is more, it is complete and ensures no irrelevant credentials are disclosed during the trust negotiation.
文摘This paper, combined with the main feature, function, market effect, development and current situation of ME-commerce in china. analyses the problems of ME-commerce and presents the feasible countermeasure as well as the development plan.
文摘Mobile Network technology has been being the research focus during the 1990’s. The middleware technology is imported for the sake of running distributed transaction smoothly. In this paper, a mobile agent based middleware high efficiency mobile electronic business oriented middleware (HEMEBOM) is designed and implemented based on the requirement and background of collaborative electronic business. Its architecture, elements and excellent properties are mainly focused. Then high efficiency mobile electronic business system μMcommerce is built using HEMEBOM.
文摘Our today’s world is becoming digital and mobile. Exploiting the advantages of wireless communication protocols is not only for telecommunication purposes, but also for payments, interaction with intelligent vehicles, etc. One of the most widespread wireless capabilities is the Bluetooth protocol. Just in 2010, 906 million mobile Bluetooth enabled phones had been sold, and in 2011, there were more than 40 million Bluetooth enabled health and medical devices on the market. Still in 2011, one third of all new vehicles produced worldwide included Bluetooth technology. Security and privacy protection is key in the digital world of today. There are security and privacy risks such as device tracking, communication eavesdropping, etc., which may come from improper Bluetooth implementation with very severe consequences for the users. The objective of this paper is to analyze the usage of Bluetooth in m-commerce and m-payment fields. The steps undertaken in this paper in order to come to a proposal for a secure architecture are the analysis of the state of the art of the relevant specifications, the existing risks and the known vulnerabilities the related known attacks. Therefore, we give first an overview of the general characteristics of Bluetooth technology today, going deeper in the analysis of Bluetooth stack’s layers and the security features offered by the specifications. After this analysis of the specifications, we study how known vulnerabilities have been exploited with a comprehensive list of known attacks, which poses serious threats for the users. With all these elements as background, we conclude the paper proposing a design for Secure Architecture for Bluetooth-Enhanced Mobile “Smart” Commerce Environments.