[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/967900.968059acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
Article

An anonymous bonus point system for mobile commerce based on word-of-mouth recommendation

Published: 14 March 2004 Publication History

Abstract

Next generation mobile devices will allow users to share and pass information within anonymous groups of people in an ad hoc manner. This will smooth the path for many kinds of new mobile commerce applications. In this paper we present a mobile commerce application that is part of the iClouds research project. It allows the dissemination of digital advertisements among interested mobile users. To create an incentive, an anonymous bonus point system rewards users who help to carry an advertisement from a merchant to a customer. This work includes a formal description of our bonus point model, a thorough discussion of the security goals, their realization and some first results about crypto-operation runtime behavior on a state-of-the-art PDA.

References

[1]
C. Becker, M. Bauer, and J. Hähner. Usenet-on-the-fly -- Supporting Locality of Information in Spontaneous Networking Environments. In R. Liscano and G. Kortuem, editors, Workshop on Ad Hoc Communications and Collaboration in Ubiquitous Computing Environments, New Orleans, USA, 2002. ACM Press.
[2]
D. L. Chaum. Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Communications of the ACM, 24(2):84--88, 1981.
[3]
Cryptix JCE Provider. http://www.cryptix.org (seen 09/2003).
[4]
D. Eastlake 3rd, J. Reagle, and D. Solo. (Extensible Markup Language) XML-Signature Syntax and Processing, RFC 3275, 2002.
[5]
A. Heinemann, J. Kangasharju, F. Lyardet, and M. Mühlhäuser. Ad Hoc Collaboration and Information Services Using Information Clouds. In T. Braun, N. Golmie, and J. Schiller, editors, Proceedings of the 3rd Workshop on Applications and Services in Wireless Networks, (ASWN 2003), pages 233--242, Bern, Switzerland, 2003. Institute of Computer Science and Applied Mathematics, University of Bern.
[6]
A. Heinemann, J. Kangasharju, F. Lyardet, and M. Mühlhäuser. iClouds -- Peer-to-Peer Information Sharing in Mobile Environments. In H. Kosch, L. Böszörményi, and H. Hellwagner, editors, Proceedings of the 9th International Euro-Par Conference, (Euro-Par 2003), volume 2790 of Lecture Notes in Computer Science, pages 1038--1045, Klagenfurt, Austria, 2003. Springer.
[7]
A. Heinemann and T. Straub. Mund-zu-Mund-Propaganda mit Bonussystem in mobilen Ad-Hoc-Netzen. In K. R. Dittrich, W. König, A. Oberweis, K. Rannenberg, and W. Wahlster, editors, INFORMATIK 2003 - Innovative Informatikanwendungen, Band 2, Beiträge der 33. Jahrestagung der Gesellschaft für Informatik e.V. (GI), volume 35 of LNI, pages 366--371, Frankfurt am Main, Germany, 2003. Springer.
[8]
ITU-T. ITU-T Recommendation X.509 version 3 (1997). "Information Technology -- Open Systems Interconnection -- The Directory Authentication Framework" ISO/IEC 9594-8, 1997.
[9]
D. B. Johnson, D. A. Maltz, and J. Broch. DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks, chapter 5, pages 139--172. Addison-Wesley, 2001.
[10]
G. Kortuem, J. Schneider, D. Preuitt, T. G. C. Thompson, S. Fickas, and Z. Segall. When Peer-to-Peer comes Face-to-Face: Collaborative Peer-to-Peer Computing in Mobile Ad-hoc Networks. In Proceedings of the First International Conference on Peer-to-Peer Computing (P2P'01), pages 75--94, Linköping, Sweden, 2001. IEEE Computer Society.
[11]
A. K. Lenstra and E. R. Verheul. Selecting Cryptographic Key Sizes. Journal of Cryptology, 14(4):255--293, 2001.
[12]
M. Papadopouli and H. Schulzrinne. Seven Degrees of Separation in Mobile Ad Hoc Networks. In Proceedings of the IEEE Conference on Global Communications (GLOBECOM), pages 1707--1711, San Francisco, USA, 2000. IEEE Computer Society.
[13]
PAYBACK. http://www.payback.com (seen 09/2003).
[14]
C. E. Perkins and E. M. Royer. Ad-hoc On-Demand Distance Vector Routing. In Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications, pages 90--100, New Orleans, USA, 1999. IEEE Computer Society.
[15]
T. Schwotzer and K. Geihs. Shark -- a System for Management, Synchronization and Exchange of Knowledge in Mobile User Groups. Journal of Universal Computer Science, 8(6):644--651, 2002.
[16]
C. Seitz and M. Berger. Towards an Approach for Mobile Profile Based Distributed Clustering. In H. Kosch, L. Böszörményi, and H. Hellwagner, editors, Proceedings of the 9th International Euro-Par Conference, (Euro-Par 2003), volume 2790 of Lecture Notes in Computer Science, pages 1109--1117, Klagenfurt, Austria, 2003. Springer.
[17]
A. Tveit. Peer-to-Peer based Recommendations for Mobile Commerce. In Proceedings of the First International Workshop on Mobile Commerce, pages 26--29, Rome, Italy, 2001. ACM Press.
[18]
D. J. Watts. Small Worlds: The Dynamics of Networks Between Order and Randomness. Princeton University Press, 1999.
[19]
Webmiles. http://www.webmiles.biz (seen 09/2003).

Cited By

View all
  • (2017)Private and Secure Distribution of Targeted Advertisements to Mobile PhonesFuture Internet10.3390/fi90200169:2(16)Online publication date: 1-May-2017
  • (2017)ANONUS: Anonymous Bonus Point System with Fraud Detection2017 IEEE 42nd Conference on Local Computer Networks (LCN)10.1109/LCN.2017.50(356-364)Online publication date: Oct-2017
  • (2013)Economic incentive-based brokerage schemes for improving data availability in mobile-P2P networksComputer Communications10.1016/j.comcom.2013.01.01236:8(861-874)Online publication date: 1-May-2013
  • Show More Cited By
  1. An anonymous bonus point system for mobile commerce based on word-of-mouth recommendation

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      SAC '04: Proceedings of the 2004 ACM symposium on Applied computing
      March 2004
      1733 pages
      ISBN:1581138121
      DOI:10.1145/967900
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 14 March 2004

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. ad hoc networking
      2. anonymous
      3. bonus point system
      4. iClouds
      5. mobile commerce

      Qualifiers

      • Article

      Conference

      SAC04
      Sponsor:
      SAC04: The 2004 ACM Symposium on Applied Computing
      March 14 - 17, 2004
      Nicosia, Cyprus

      Acceptance Rates

      Overall Acceptance Rate 1,650 of 6,669 submissions, 25%

      Upcoming Conference

      SAC '25
      The 40th ACM/SIGAPP Symposium on Applied Computing
      March 31 - April 4, 2025
      Catania , Italy

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)4
      • Downloads (Last 6 weeks)1
      Reflects downloads up to 22 Dec 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2017)Private and Secure Distribution of Targeted Advertisements to Mobile PhonesFuture Internet10.3390/fi90200169:2(16)Online publication date: 1-May-2017
      • (2017)ANONUS: Anonymous Bonus Point System with Fraud Detection2017 IEEE 42nd Conference on Local Computer Networks (LCN)10.1109/LCN.2017.50(356-364)Online publication date: Oct-2017
      • (2013)Economic incentive-based brokerage schemes for improving data availability in mobile-P2P networksComputer Communications10.1016/j.comcom.2013.01.01236:8(861-874)Online publication date: 1-May-2013
      • (2013)The Role of Incentive-Based Crowd-Driven Data Collection in Big Data AnalyticsProceedings of the Second International Conference on Big Data Analytics - Volume 830210.1007/978-3-319-03689-2_6(86-96)Online publication date: 16-Dec-2013
      • (2010)Analyzing the Forwarding Behavior in Mobile Viral MarketingHandbook of Research on Mobile Marketing Management10.4018/978-1-60566-074-5.ch020(381-400)Online publication date: 2010
      • (2010)Opportunistic Networks as an Enabling Technology for Mobile Word-of-Mouth AdvertisingHandbook of Research on Mobile Marketing Management10.4018/978-1-60566-074-5.ch013(236-254)Online publication date: 2010
      • (2010)Improving data availability via an economic lease model in mobile-P2P networksInternational Journal of Computational Science and Engineering10.1504/IJCSE.2010.0376795:3/4(243-253)Online publication date: 1-Dec-2010
      • (2010)E-ARLDistributed and Parallel Databases10.1007/s10619-010-7063-628:1(1-31)Online publication date: 1-Aug-2010
      • (2009)An economic incentive model for encouraging peer collaboration in mobile-P2P networks with support for constraint queriesPeer-to-Peer Networking and Applications10.1007/s12083-009-0035-92:3(230-251)Online publication date: 4-Mar-2009
      • (2009)Collaboration at the Basis of Sharing Focused Information: The Opportunistic NetworksComputational Intelligence10.1007/978-3-642-01799-5_15(501-524)Online publication date: 2009
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media