A micro-payment scheme for multiple-vendor in m-commerce

Author(s):  
Jianming Zhu ◽  
Ninghong Wang ◽  
Jianfeng Ma
Keyword(s):  
2017 ◽  
Vol 2017 ◽  
pp. 1-11 ◽  
Author(s):  
Doo Ho Lee

This work investigates the optimal pricing strategies of a server and the equilibrium behavior of customers in an unobservable M/M/1 queueing system with negative customers and repair. In this work, we consider two pricing schemes. The first is termed the ex-post payment scheme, where the server charges a price that is proportional to the time spent by a customer in the system. The second scheme is the ex-ante payment scheme, where the server charges a flat rate for all services. Based on the reward-cost structure, the server (or system manager) should make optimal pricing decisions in order to maximize its expected profit per time unit in each payment scheme. This study also investigates equilibrium joining/balking behavior under the server’s optimal pricing strategies in the two pricing schemes. We show, given a customer’s equilibrium, that the two pricing schemes are perfectly identical from an economic point of view. Finally, we illustrate the effect of several system parameters on the optimal joining probabilities, the optimal price, and the equilibrium behavior via numerical examples.


2001 ◽  
Vol 55 (3) ◽  
pp. 221-229 ◽  
Author(s):  
Min-Shiang Hwang ◽  
Iuon-Chang Lin ◽  
Li-Hua Li
Keyword(s):  

2008 ◽  
Vol 13 (3) ◽  
pp. 375-394 ◽  
Author(s):  
JENNIFER ALIX-GARCIA ◽  
ALAIN DE JANVRY ◽  
ELISABETH SADOULET

ABSTRACTThis paper discusses the gain in efficiency from including deforestation risk as a targeting criterion in payments for environmental services (PES) programs. We contrast two payment schemes that we simulate using data from Mexican common property forests: a flat payment scheme with a cap on allowable hectares per enrollee, similar to the program implemented in many countries, and a payment that takes deforestation risk and heterogeneity in land productivity into account. We simulate the latter strategy both with and without a budget constraint. Using observed past deforestation, we find that while risk-targeted payments are far more efficient, capped flat payments are more egalitarian. We also consider the characteristics of communities receiving payments from both programs. We find that the risk-weighted scheme results in more payments to poor communities, and that these payments are more efficient than those made to non-poor ejidos. Finally, we show that the risk of deforestation can be predicted quite precisely with indicators that are easily observable and that cannot be manipulated by the community.


Symmetry ◽  
2018 ◽  
Vol 10 (12) ◽  
pp. 685
Author(s):  
Raylin Tso

With the developments of mobile communications, M-commerce has become increasingly popular in recent years. However, most M-commerce schemes ignore user anonymity during online transactions. As a result, user transactions may easily be traced by shops, banks or by Internet Service Providers (ISPs). To deal with this problem, we introduce a new anonymous mobile payment scheme in this paper. Our new scheme has the following features: (1) Password-based authentication: authentication of users is done by low-entropy password; (2) Convenience: the new scheme is designed based on near field communication (NFC)-enabled devices and is compatible with EuroPay, MasterCard and Visa (EMV-compatible); (3) Efficiency: users do not need to have their own public/private key pairs and confidentiality is achieved via symmetric-key cryptography; (4) Anonymity: users use virtual accounts in the online shopping processes, thereby preventing attackers from obtaining user information even if the transaction is eavesdropped; (5) Untraceablity: no one (even the bank, Trusted Service Manager (TSM), or the shop) can trace a transaction and link the real identity with the buyer of a transaction; (6) Confidentiality and authenticity: all the transaction is either encrypted or signed by the sender so our new scheme can provide confidentiality and authenticity. We also present the performance and the security comparison of our scheme with other schemes. The results show that our scheme is applicable and has the most remarkable features among the existing schemes.


2003 ◽  
pp. 107-127 ◽  
Author(s):  
Hua Wang ◽  
Yanchun Zhang ◽  
Jinli Cao

1981 ◽  
Vol 10 (4) ◽  
pp. 18-22
Author(s):  
Abby Ghobadian
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document