Secure E-Coupons

@article{Blundo2005SecureE,
  title={Secure E-Coupons},
  author={Carlo Blundo and Stelvio Cimato and Annalisa De Bonis},
  journal={Electronic Commerce Research},
  year={2005},
  volume={5},
  pages={117-139}
}
As the Internet is getting easier and faster to use, electronic coupon (e-coupon) distribution is becoming a more and more popular advertising technique. E-coupons are the digital analogue of paper coupons which are used to provide customers with discounts or gift in order to incentive the purchase of some products. Nowadays, the potential of digital coupons has not been fully exploited on the web. This is mostly due to the lack of “efficient” techniques to handle the generation and… 
Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly
TLDR
A multi-coupon scheme for federated environments that preserves the security and privacy properties of existing schemes, as well as their asymptotic communication and computation complexity is proposed.
An Architecture for Anonymous Mobile Coupons in a Large Network
TLDR
This work proposes an architecture which may enable significant improvements over current m-coupon technology, in terms of acceptance of potential customers and of marketing actions that become feasible.
A Novel Sharing M-Coupons with Lightweight Computations via Cloud Computing
TLDR
This paper proposed a secure sharing m-coupon scheme that a user can use the mobile device to share the sharable m-Coupons to his/her friend through the cloud, and incorporates only lightweight computations, message authentication code, and simple hash chains for security.
NFC mobile coupon protocols : developing, formal security modelling and analysis, and addressing relay attack
TLDR
A formal security analysis of NFC M-coupon protocols is performed, using formal methods (CasperFDR) in an effort to check the the security of these protocols and whether they address their requirements.
A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting
TLDR
A new security model for MC systems with stronger definitions is proposed, followed by a concrete realization where single coupons within a MC may represent different goods or services, have independent validity periods, and must be redeemed sequentially ensuring a stronger version of unsplittability compared to all-or-nothing sharing.
Online vs. Offline Coupon Redemption Behaviors
Coupons are among the most important promotional vehicles used today. Traditionally, coupons have been distributed through printed offline media, such as newspapers or postal mails. Along with
Towards interoperability in mobile coupons: Enabling cross retailer coupon validation
  • K. Fuchs, Denis Vuckovac, A. Ilic
  • Business, Computer Science
    2017 International Conference on Information and Communication Technology Convergence (ICTC)
  • 2017
TLDR
Findings from an interoperable couponing trial connecting 17 retailers, 8 different mobile applications and one brand are presented, and the chosen interface design necessary for implementation and coupon validation are discussed.
Towards interoperability in mobile coupons: Enabling cross retailer coupon validation
TLDR
Findings from an interoperable couponing trial connecting 17 retailers, 8 different mobile applications and one brand are presented, and the chosen interface design necessary for implementation and coupon validation are discussed.
...
1
2
3
4
...

References

SHOWING 1-10 OF 14 REFERENCES
Online Advertising: Secure E-coupons
TLDR
This paper proposes a protocol for e-coupons which satisfies security requirements, is lightweight and preserves users privacy since it does not require users' registration.
Secure and Lightweight Advertising on the Web
Secure and Efficient Metering
TLDR
An environment in which many servers serve an even larger number of clients, and it is required to meter the interaction between servers and clients is considered, based on efficient cryptographic techniques several secure and efficient constructions of metering systems are suggested.
Metering Schemes with Pricing
TLDR
This paper provides lower bounds on the size of the information distributed to clients and to servers by metering schemes and presents a scheme which achieves these lower bounds.
Auditable Metering with Lightweight Security
TLDR
The foundations of the timing scheme are described and its deployment in the WWW is described, using the diiculty of computing a timing function to leverage the security of a metering method.
How to time-stamp a digital document
TLDR
Computationally practical procedures are proposed for digital time-stamping of such documents so that it is infeasible for a user either to back-date or to forward-date his document, even with the collusion of a time-Stamping service.
Handbook of Applied Cryptography
From the Publisher: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of
An Architecture for Secure Generation and Verification of Electronic Coupons
Distributing E-Coupons on the Internet.
  • In Proceedings of 9th Conference on Internet Society (INET’99),
  • 1999
...
1
2
...