:::

詳目顯示

回上一頁
題名:具便捷性與安全性之行動消費者主導交易協定
書刊名:資訊管理學報
作者:薛夙珍 引用關係陳星百
作者(外文):Hsueh, Sue-chenChen, Hsing-bai
出版日期:2006
卷期:13:4
頁次:頁103-132
主題關鍵詞:行動商務消費者主導資訊安全個人化Mobile commerceBuyer-driven commerce modelUndeniable transactionsPersonalization
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(1) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:1
  • 共同引用共同引用:0
  • 點閱點閱:27
隨著無線網路基礎建設的日趨成熟與手持設備的普及,促進了行動商務的發展,使得行動網路上所呈現的商品與服務種類日益豐富。然而,受制於行動設備有限資源之行動用戶在運用以商家主導之商業模式,經常需花費大量的資訊蒐集時間與連線成本,此外,繁複的行動交易程序更將降低其參與之意願。本文提出兼具便捷性與安全性之全球化行動消費者主導交易協定,應用條件採購單交易模式於資源珍貴之行動商務環境,減少所需耗費的搜尋與交易成本,並降低對行動設備之輸出入與通訊等資源需求。協定的設計藉由採購條件之提出,賦予行動消費者主導商品樣式與價格之權利,與符合其消費需求的潛在商家進行交易,以提供消費者一個兼具個人化與最高購物效益的交易模式。此外,協定採用具效率之密碼技術,以適應於低運算資源的行動環境下運作,並建立安全與公平之全球化行動交易環境,進而保障買賣雙方之交易權益。
Wireless technology is boosting the accessibility of Internet services to mobile users. Having the easy-to-carry mobile devices, mobile users now may conduct transactions anytime and anywhere, but they also suffer from the restrictions like limited computing power, small storage space, poor input/output interfaces, etc. Using such resource-limited devices to search services/products in the traditional seller-driven commercial model is more time-consuming than ever. To reduce the search time and the connection costs of mobile users, this paper presents a secure and convenient buyer-driven commerce model. We adopt and improve the conditional-purchase ordering mechanism, which allows users to specify their unique requirements and filter the intended merchants on public servers. We also provide light-weight security mechanisms for confidential and undeniable transactions without demanding high-end mobile devices. Therefore, both buyers and sellers will benefit from the personalized mobile commerce model.
期刊論文
1.Elgamal, T.(1985)。A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms。IEEE Transactions on Information Theory,31(4),469-472。  new window
2.Varshney, U.、Vetter, R. J.、Kalakota, R.(2000)。Mobile commerce: a new frontier。IEEE Computer,33(10),32-38。  new window
3.Senn, J. A.(2000)。The Emergence of M-Commerce。Computer,33(12),148-150。  new window
4.Diffie, W.、Hellman, M. E.(1976)。New Directions in Cryptography。IEEE Transactions on Information Theory,22(6),644-654。  new window
5.Barnes, S. J.(2002)。The mobile commerce value chain: Analysis and future developments。International Journal of Information Management,22(2),91-108。  new window
6.Herzberg, Amir(2003)。Payments and banking with mobile personal devices。Communications of the ACM,46(5),53-58。  new window
7.Tsalgatidou, A.、Pitoura, E.(2001)。Business Models and Transactions in Mobile Electronic Commerce: Requirements and Properties。Computer Networks,37(2),221-236。  new window
8.Asokan, N.、Janson, P. A.、Steiner, M.、Waidner, M.(1997)。The State of the Art in Electronic Payment Systems。IEEE Transactions on Computers,30(9),28-35。  new window
9.Bird, R.、Gopal, I.、Herzberg, A.、Janson, P.、Kutten, S.、Molva, R.、Yung, M.(1995)。The KryptoKnight Family of Light-weight Protocols for Authentication and Key Distribution。IEEE/ACM Transactions on Networking,3(1),31-41。  new window
10.Boman, K.、Horn, G.、Howard, P.、Niemi, V.(2002)。UMTS Security。Electronics & Communication Engineering Journal,14(5),191-204。  new window
11.Ginzboorg, P.(2000)。Seven Comments on Charging and Billing。Communications of the ACM,43(11),89-92。  new window
12.Grecas, C. F.、Maniatis, S. I.、Venieris, I. S.(2003)。Introduction of the Asymmetric Cryptography in GSM, GPRS, UMTS, and Its Public Key Infrastructure Integration。Mobile Networks and Applications,8(2),145-150。  new window
13.Horn, G.、Preneel, B.(2000)。Authentication and Payment in Future Mobile Systems。Journal of Computer Security,8,183-207。  new window
14.Jin, L.、Ren, S.、Feng, L.、Hua, G. Z.(2002)。Research on WAP Client Supports SET Payment Protocol。IEEE Wireless Communications,9(1),90-95。  new window
15.Lin, C. H.、Dow, C. R.(2001)。Efficient Checkpoint-based Failure Recovery Techniques in Mobile Computing Systems。Journal of Information Science and Engineering,17,549-573。  new window
16.Lin, T. H.、Shin, K. G.(1998)。Damage Assessment for Optimal Rollback Recovery。IEEE Transactions on Computers,47(5),603-613。  new window
17.Naruse, K.(2002)。Findings of the Mobile-users Survey。ECOM Journal,4,52-57。  new window
18.Park, T.、Woo, N.、Yeom, H. Y.(2002)。An Efficient Optimistic Message Logging Scheme for Recoverable Mobile Computing Systems。IEEE Transactions on Mobile Computing,1(4),265-277。  new window
19.Park, T.、Woo, N.、Yeom, H. Y.(2003)。An Efficient Recovery Scheme for Fault-tolerant Mobile Computing Systems。Future Generation Computer Systems,19(1),37-53。  new window
20.Samfat, D.、Molva, R.、Tsudik, G.(1994)。Authentication of Mobile Users。IEEE Network,8(2),26-34。  new window
21.Shelfer, K. M.、Procaccino, J. D.(2002)。Smart Card Evolution。Communications of the ACM,45(7),83-88。  new window
22.Sirbu, M. A.(1997)。Credits and Debits on the Internet。IEEE Spectrum,34(2),23-29。  new window
23.Stach, J. F.、Park, E. K.、Makki, K.(1999)。Performance of an Enhanced GSM Protocol Supporting Non-repudiation of Service。Computer Communications,22(7),675-680。  new window
24.Varshney, U.(2002)。Mobile Payments。IEEE Transactions on Computers,35(12),120-121。  new window
會議論文
1.Chen, H. B.、Hsueh, S. C.(2003)。Light-weight Authentication and Billing in Mobile Communications。Taipei。245-252。  new window
2.Dai, Y.、Zhang, L.(2003)。A Security Payment Scheme of Mobile E-commerce。0。949-952。  new window
3.Foo, E.、Boyd, C.(1998)。A Payment Scheme Using Vouchers。0。103-121。  new window
4.Foo, E.、Boyd, C.(1998)。Passive Entities: A Strategy for Electronic Payment Design。0。134-148。  new window
5.Kelsey, J.、Schneier, B.(1997)。Conditional Purchase Orders。0。117-124。  new window
6.Kim, M. A.、Lee, H. K.、Kim, S. W.、Lee, W. H.、Kang, E. K.(2002)。Implementation of Anonymity-based E-payment System for M-commerce。0。363-366。  new window
7.Pagliusi, P. S.(2000)。A Contemporary Foreword on GSM Security。0。129-144。  new window
8.Zheng, X.、Chen, D.(2003)。Study of Mobile Payments System。0。24-27。  new window
圖書
1.Schneier, B.(1996)。Applied Cryptography: Protocols, Algorithms, and Source Code in C。Applied Cryptography: Protocols, Algorithms, and Source Code in C。New York, NY:John Wiley & Sons。  new window
2.Kalakota, R.、Robinson, M.(2001)。M-business: The Race to Mobility。New York:McGraw Hill。  new window
其他
1.Datamonitor Research Ltd.(2000)。Mobile Payment Systems,0。  new window
2.Durlacher Research Ltd.(2000)。Mobile Commerce Report,0。  new window
3.NTT DoCoMo(2004)。Subscriber Growth,0。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
QR Code
QRCODE