Secure E-Coupons
@article{Blundo2005SecureE, title={Secure E-Coupons}, author={Carlo Blundo and Stelvio Cimato and Annalisa De Bonis}, journal={Electronic Commerce Research}, year={2005}, volume={5}, pages={117-139} }
As the Internet is getting easier and faster to use, electronic coupon (e-coupon) distribution is becoming a more and more popular advertising technique. E-coupons are the digital analogue of paper coupons which are used to provide customers with discounts or gift in order to incentive the purchase of some products. Nowadays, the potential of digital coupons has not been fully exploited on the web. This is mostly due to the lack of “efficient” techniques to handle the generation and…
31 Citations
The design of secure mobile coupon mechanism with the implementation for NFC smartphones
- Computer ScienceComput. Electr. Eng.
- 2017
Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly
- Computer Science, MathematicsISPEC
- 2008
A multi-coupon scheme for federated environments that preserves the security and privacy properties of existing schemes, as well as their asymptotic communication and computation complexity is proposed.
An Architecture for Anonymous Mobile Coupons in a Large Network
- BusinessJ. Comput. Networks Commun.
- 2016
This work proposes an architecture which may enable significant improvements over current m-coupon technology, in terms of acceptance of potential customers and of marketing actions that become feasible.
A Novel Sharing M-Coupons with Lightweight Computations via Cloud Computing
- Computer ScienceAINA Workshops
- 2019
This paper proposed a secure sharing m-coupon scheme that a user can use the mobile device to share the sharable m-Coupons to his/her friend through the cloud, and incorporates only lightweight computations, message authentication code, and simple hash chains for security.
NFC mobile coupon protocols : developing, formal security modelling and analysis, and addressing relay attack
- Computer Science, Mathematics
- 2015
A formal security analysis of NFC M-coupon protocols is performed, using formal methods (CasperFDR) in an effort to check the the security of these protocols and whether they address their requirements.
A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting
- Computer ScienceFinancial Cryptography
- 2007
A new security model for MC systems with stronger definitions is proposed, followed by a concrete realization where single coupons within a MC may represent different goods or services, have independent validity periods, and must be redeemed sequentially ensuring a stronger version of unsplittability compared to all-or-nothing sharing.
Online vs. Offline Coupon Redemption Behaviors
- Business
- 2010
Coupons are among the most important promotional vehicles used today. Traditionally, coupons have been distributed through printed offline media, such as newspapers or postal mails. Along with…
Towards interoperability in mobile coupons: Enabling cross retailer coupon validation
- Business, Computer Science2017 International Conference on Information and Communication Technology Convergence (ICTC)
- 2017
Findings from an interoperable couponing trial connecting 17 retailers, 8 different mobile applications and one brand are presented, and the chosen interface design necessary for implementation and coupon validation are discussed.
Towards interoperability in mobile coupons: Enabling cross retailer coupon validation
- Business, Computer Science
- 2017
Findings from an interoperable couponing trial connecting 17 retailers, 8 different mobile applications and one brand are presented, and the chosen interface design necessary for implementation and coupon validation are discussed.
References
SHOWING 1-10 OF 14 REFERENCES
Online Advertising: Secure E-coupons
- Computer ScienceICTCS
- 2001
This paper proposes a protocol for e-coupons which satisfies security requirements, is lightweight and preserves users privacy since it does not require users' registration.
Secure and Efficient Metering
- Computer ScienceEUROCRYPT
- 1998
An environment in which many servers serve an even larger number of clients, and it is required to meter the interaction between servers and clients is considered, based on efficient cryptographic techniques several secure and efficient constructions of metering systems are suggested.
On the Security of Pay-per-Click and Other Web Advertising Schemes
- Computer ScienceComput. Networks
- 1999
Metering Schemes with Pricing
- Computer ScienceDISC
- 2000
This paper provides lower bounds on the size of the information distributed to clients and to servers by metering schemes and presents a scheme which achieves these lower bounds.
Auditable Metering with Lightweight Security
- Computer ScienceJ. Comput. Secur.
- 1998
The foundations of the timing scheme are described and its deployment in the WWW is described, using the diiculty of computing a timing function to leverage the security of a metering method.
How to time-stamp a digital document
- Computer ScienceJournal of Cryptology
- 2004
Computationally practical procedures are proposed for digital time-stamping of such documents so that it is infeasible for a user either to back-date or to forward-date his document, even with the collusion of a time-Stamping service.
Handbook of Applied Cryptography
- Computer Science, Mathematics
- 1996
From the Publisher:
A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of…
An Architecture for Secure Generation and Verification of Electronic Coupons
- Computer ScienceUSENIX Annual Technical Conference, General Track
- 2001
Distributing E-Coupons on the Internet.
- In Proceedings of 9th Conference on Internet Society (INET’99),
- 1999