Table of Contents Author Guidelines Submit a Manuscript
Journal of Computer Networks and Communications
Volume 2016 (2016), Article ID 2349148, 10 pages
http://dx.doi.org/10.1155/2016/2349148
Research Article

An Architecture for Anonymous Mobile Coupons in a Large Network

DIA, University of Trieste, Trieste, Italy

Received 5 September 2016; Revised 28 October 2016; Accepted 15 November 2016

Academic Editor: Gianluigi Ferrari

Copyright © 2016 Alberto Bartoli and Eric Medvet. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. Introduction to Mobile Coupons (version 97), Mobile Marketing Association, 2007, https://www.mmaglobal.com/files/mobilecoupons.pdf.
  2. P. Reichhart, C. Pescher, and M. Spann, “A comparison of the effectiveness of e-mail coupons and mobile text message coupons for digital products,” Electronic Markets, vol. 23, no. 3, pp. 217–225, 2013. View at Publisher · View at Google Scholar · View at Scopus
  3. Marketers Boost Efforts to Reach Coupon Clippers Via Mobile—Emarketer, In: Emarketer.Com, http://www.emarketer.com/Article/Marketers-Boost-Efforts-Reach-Coupon-Clippers-via-Mobile/1012488.
  4. C. Blundo, S. Cimato, and A. De Bonis, “Secure e-coupons,” Electronic Commerce Research, vol. 5, no. 1, pp. 117–139, 2005. View at Publisher · View at Google Scholar · View at Scopus
  5. “4Easy Validation Methods,” In: qr2coupon, http://www.qr2coupon.net/en/how_to/validate_a_coupon.
  6. Mobile Coupon Software for Retailers. In: Codebroker [Internet], http://codebroker.com/mobile-coupon-software.
  7. “Mobile Coupon Validation-How To Validate Mobile Coupons?” In: Coupontools, http://www.coupontools.com/en/how-to-validate-mobile-coupons.
  8. Mobile Coupon Redemption System, US Patent. 20110302017, 2011.
  9. N. M.-J. Achadinha, L. Jama, and P. Nel, “The drivers of consumers' intention to redeem a push mobile coupon,” Behaviour and Information Technology, vol. 33, no. 12, pp. 1306–1316, 2014. View at Publisher · View at Google Scholar · View at Scopus
  10. S. Lee, J. Hwang, and M. Y. Hyun, “Mobile services as a marketing tool to enhance restaurant revenue: an exploratory study,” Journal of Hospitality Marketing & Management, vol. 19, no. 5, pp. 464–479, 2010. View at Publisher · View at Google Scholar · View at Scopus
  11. N. Limpf and H. A. M. Voorveld, “Mobile location-based advertising: how information privacy concerns influence consumers' attitude and acceptance,” Journal of Interactive Advertising, vol. 15, no. 2, pp. 111–123, 2015. View at Publisher · View at Google Scholar
  12. R. A. Clark, J. J. Zboja, and R. E. Goldsmith, “Antecedents of coupon proneness: a key mediator of coupon redemption,” Journal of Promotion Management, vol. 19, no. 2, pp. 188–210, 2013. View at Publisher · View at Google Scholar · View at Scopus
  13. A. Dickinger and M. Kleijnen, “Coupons going wireless: determinants of consumer intentions to redeem mobile coupons,” Journal of Interactive Marketing, vol. 22, no. 3, pp. 23–39, 2008. View at Publisher · View at Google Scholar · View at Scopus
  14. F. Liébana-Cabanillas, I. Ramos de Luna, and F. J. Montoro-Ríos, “User behaviour in QR mobile payment system: the QR Payment Acceptance Model,” Technology Analysis and Strategic Management, vol. 27, no. 9, pp. 1031–1049, 2015. View at Publisher · View at Google Scholar · View at Scopus
  15. Mobile Coupon Redemption System, US Patent. US20070156517, 2007.
  16. H.-C. Hsiang, “A secure and efficient authentication scheme for M-coupon systems,” in Proceedings of the 8th International Conference on Future Generation Communication and Networking (FGCN '14), pp. 17–20, IEEE, Haikou, China, December 2014. View at Publisher · View at Google Scholar · View at Scopus
  17. C.-C. Chang and C.-Y. Sun, “A secure and efficient authentication scheme for e-coupon systems,” Wireless Personal Communications, vol. 77, no. 4, pp. 2981–2996, 2014. View at Publisher · View at Google Scholar · View at Scopus
  18. A. Greenberg and L. Newman, Fake Boarding Pass App Gets Hacker Into Fancy Airline Lounges. In: WIRED [Internet], https://www.wired.com/2016/08/fake-boarding-pass-app-gets-hacker-fancy-airline-lounges/.
  19. Y. Shin, M. Gupta, and S. Myers, “A study of the performance of SSL on PDAs,” in Proceedings of the IEEE International Conference on Computer Communications (INFOCOM '09), April 2009. View at Publisher · View at Google Scholar · View at Scopus
  20. H. Tschofenig and M. Pegourie-Gonnard, “Performance of state-of-the-art cryptography on ARM-based microprocessors,” in Proceedings of the NIST Lightweight Cryptography Workshop 2015, Gaithersburg, Md, USA, 2015 http://csrc.nist.gov/groups/ST/lwc-workshop2015/presentations/session7-vincent.pdf.
  21. P. Kieseberg, M. Leithner, M. Mulazzani et al., “QR code security,” in Proceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia (MoMM '10), pp. 430–435, ACM, Paris, France, November 2010. View at Publisher · View at Google Scholar · View at Scopus
  22. J. Ellis, Lightweight transactions in Cassandra 2.0 [Internet], Datastax, http://www.datastax.com/dev/blog/lightweight-transactions-in-cassandra-2-0.
  23. D. E. Hammer-Lahav and D. Hardt, “The oauth 2.0 authorization protocol,” IETF Internet Draft, 2011.
  24. L. Finžgar and M. Trebar, “Use of NFC and QR code identification in an electronic ticket system for public transport,” in Proceedings of the 19th International Conference on Software, Telecommunications and Computer Networks (SoftCOM '11), pp. 1–6, IEEE, Split, Croatia, September 2011. View at Scopus
  25. P. Ducklin, Anatomy Of A Change—Google Announces It Will Double Its SSL Key Sizes, Naked Security, https://nakedsecurity.sophos.com/2013/05/27/anatomy-of-a-change-google-announces-it-will-double-its-ssl-key-sizes/.
  26. Benchmarking Top NoSQL Databases [Internet], “End Point,” May 2015, http://www.datastax.com/wp-content/themes/datastax-2014-08/files/NoSQL_Benchmarks_EndPoint.pdf.
  27. Cockcroft Adrian And. Benchmarking Cassandra scalability over AWS: over 1 million writes per second [Internet], Netflix, Novmber 2011, http://techblog.netflix.com/2011/11/benchmarking-cassandra-scalability-on.html.
  28. C. Kalantzis, “Revisiting 1 Million Writes per second [Internet],” Netflix, July 2014, http://techblog.netflix.com/2014/07/revisiting-1-million-writes-per-second.html.
  29. NGINX SSL Performance [Internet], NGINX, July 2014, https://www.nginx.com/wp-content/uploads/2014/07/NGINX-SSL-Performance.pdf.