Small worlds: the dynamics of networks between order and randomness
Small worlds: the dynamics of networks between order and randomness
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Peer-to-peer based recommendations for mobile commerce
WMC '01 Proceedings of the 1st international workshop on Mobile commerce
Ad-hoc On-Demand Distance Vector Routing
WMCSA '99 Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications
When Peer-to-Peer comes Face-to-Face: Collaborative Peer-to-Peer Computing in Mobile Ad hoc Networks
P2P '01 Proceedings of the First International Conference on Peer-to-Peer Computing
Incentives for electronic coupon systems
MobiShare '06 Proceedings of the 1st international workshop on Decentralized resource sharing in mobile computing and networking
EcoRare: An Economic Incentive Scheme for Efficient Rare Data Accessibility in Mobile-P2P Networks
DEXA '08 Proceedings of the 19th international conference on Database and Expert Systems Applications
Secure and private incentive-based advertisement dissemination in mobile ad hoc networks
IWSEC'07 Proceedings of the Security 2nd international conference on Advances in information and computer security
Distributed and Parallel Databases
Improving data availability via an economic lease model in mobile-P2P networks
International Journal of Computational Science and Engineering
Hi-index | 0.00 |
Next generation mobile devices will allow users to share and pass information within anonymous groups of people in an ad hoc manner. This will smooth the path for many kinds of new mobile commerce applications. In this paper we present a mobile commerce application that is part of the iClouds research project. It allows the dissemination of digital advertisements among interested mobile users. To create an incentive, an anonymous bonus point system rewards users who help to carry an advertisement from a merchant to a customer. This work includes a formal description of our bonus point model, a thorough discussion of the security goals, their realization and some first results about crypto-operation runtime behavior on a state-of-the-art PDA.