Seamlessness & Privacy Enhanced Ubiquitous Payment

نویسندگان

  • Kyoung Jun Lee
  • Mu Jeong Jeong
  • Jeong-In Ju
چکیده

Payment is in nature an act of money transfer from one entity to another, and it is obvious that a payment method will be valued as long as the transaction can be completed with safety no matter what technology was used. The key to U-payment is convenience and security in the transfer of financial information. The purpose of this paper is to find a desirable U-payment scheme promoting seamlessness and privacy with a strong personal device and peer-based information transactions. We propose U-SDT(Secure Direct Transfer) Protocol as a way to make transactions seamless, secure and privacy-

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Incentive-Based and Peer-Oriented Design of Ubiquitous Commerce

Seamlessness is the keyword of U-Commerce which may be defined as the commercial interaction among providers, consumers, products, and services, enabled and supported especially by the real-world seamless communication of each entity and object's digital information. However, the possibility of the seamless transactions increases the privacy risk of the entities involved. Therefore, the core is...

متن کامل

Ethics of Seamless infrastructures: Resources and Future Directions

The argument of this paper is that the rhetoric of “seamlessness” and its embodiment within certain information infrastructures may be ethically problematic due to the way it articulates a particular kind of passivity and lack of engagement between people and their actions and between people and their social and material environment. The paper describes “seamlessness” as a socio-technical value...

متن کامل

Seamful ubiquity: Beyond seamless integration

In this paper we question the orthodoxy that ubiquitous computing systems should be . We briefly explore some notions of seamlessness and suggest, by example, why alternative approaches may be required. Rather than a fully-formed model, this is an initial step towards a new conceptual framework for understanding interaction to frame the design of ubiquitous computing. It is based on our develop...

متن کامل

Privacy Preserving Association Rule Mining in Ubiquitous Computing Environment

Resource Constrained Devices (RCD) in general construct the pervasive computing environment which are equipped with too limited resources to deploy privacy preserving data mining applications. This paper proposes a communication efficient and perturbation based privacy preserving association rule mining (ARM) algorithm for this ubiquitous computing environment. Existing cryptography based priva...

متن کامل

In Seamful Design: Showing the Seams in Wearable Computing

this paper, we question the assumption that seamless integration of computer system components is necessarily a design requirement for wearable computing and for ubiquitous computing. We explore Mark Weiser's notions of seamlessness and 'seamfulness', and use them in discussing the design and use of wearable and ubicomp systems. The physical nature of the systems we design reveals itself in, fo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006