跳到主要內容

臺灣博碩士論文加值系統

(3.231.230.177) 您好!臺灣時間:2021/07/28 18:26
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:黃信誼
研究生(外文):Hsin-Yi Huang
論文名稱:具出價隱私之反向維克瑞安全拍賣機制之研究
論文名稱(外文):A Study of Secure Reverse Vickrey Auction Scheme with Bid Privacy
指導教授:施東河施東河引用關係
學位類別:碩士
校院名稱:國立雲林科技大學
系所名稱:資訊管理系碩士班
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2004
畢業學年度:92
語文別:中文
論文頁數:80
中文關鍵詞:行動商務行動代理出價隱私反向維克瑞拍賣加密鑰匙鏈
外文關鍵詞:bid privacyreverse Vickrey auctionmobile agentm-commerceencryption key chain
相關次數:
  • 被引用被引用:0
  • 點閱點閱:218
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
在傳統的拍賣機制,買家為了購買物品,必須要在網路上的數個拍賣網站搜尋想要購買的物品,當拍賣開始,買家需要非當頻繁的連線到拍賣網站,監控出價狀態和重新出價。在本計畫當中,本研究提出一個可以自動在二者之間協商的模式,並且結合了代理程式設計出MoRAAS(Mobile reverse auction agent system)系統,此系統適用於行動商務(m-commerce),並且介於買者和賣者之間,協助買者和賣者進行自動化的拍賣。本研究提出一個新穎的雙加密鑰匙鏈技術、RVP協定和RVAP協定,並且可以達到絶對的出價隱私特性,每一個輸的出價者都可以控制自己的出價隱私,並且不用信任任何人。
In Traditional scheme, the buyer in order to get the goods, he must search for the items through several auction sites in Internet. When the auction starts, the buyer needs to connect to these auction sites frequently so that he can monitor the bid states and re-bid. In this paper, we propose an automated negotiation model between two participants, for m-commerce, using collaborative mobile agents called MoRAAS (Mobile reverse auction agent system), which mediates between the buyer and the sellers and executes bidding asynchronously and autonomously. A new double encryption key chain technique and new RAP protocol and RVAP protocol are proposed to achieve unconditional bid privacy. Every losing bidder can control privacy of their own bids while no trust is needed.
一、緒論
1.1 研究背景與動機
1.2 研究目的
1.3 論文架構
二、文獻探討
2.1 拍賣
2.1.1 市場架構
2.1.2 拍賣類型
2.2 代理程式(Agent)
2.2.1 代理程式的分類
2.2.2 代理程式的特性
2.2.3 多重代理程式系統
2.3 網路服務技術
2.3.1 SOAP(簡單物件存取協定)
2.3.2 WSDL(網路服務描述語言)
2.3.3 UDDI(通用描述、查詢與整合協定)
2.3.4 網路服務(Web Services)
2.4 密封式拍賣與出價隱私
2.4.1 密封式拍賣的的分類
2.4.2 出價隱私
2.5 實行電子拍賣之障礙
2.6 本章結論
三、拍賣架構和機制
3.1 RVP(Reverse Vickrey auction with Privacy)拍賣機制
3.1.1加密鑰匙鏈(Encryption-key Chain)
3.1.2 結合網路服務的RVP模式
3.1.3 RVP拍賣流程
3.1.4 RVP的拍賣程序
3.1.5 爭議階段
3.2 MoRAAS(Mobile Reverse Auction Agent System)系統
3.2.1雙加密鑰匙鏈
3.2.2 MoRAAS的溝通模式
3.2.3 MoRAAS架構和流程
3.2.4 RVAP(Reverse Vickrey Auction Protocol with bid privacy)協定
3.3 買者和贏者的評估價(Evaluation)
四、拍賣範例和分析
4.1 RVP拍賣機制之範例
4.2 RVAP拍賣機制之範例
4.3 分析
4.3.1 分析RVP拍賣機制
4.3.2 分析RVAP拍賣機制
4.3.3 RVP和RVAP之比較
五、MoRAAS之網路服務實作
5.1 網路服務之拍賣系統架構
5.2 軟體環境
5.3 系統運作畫面
5.3.1 買者之畫面
5.3.2 賣者之畫面
六、結論及建議
6.1 結論
6.2 研究限制
6.3 未來研究建議和方向
參考文獻
[1] Abe M., Suzuki K., 2002, "M+1-st Price Auction Using Homomorphic Encryption", Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptosystems: Public Key Cryptography, pp.115-124, February 12-14
[2] Agorics, 1996, http://www.agorics.com/new.html
[3] Ateniese G., 1999,Efficient Verifiable Encryption (and Fair Exchange) of Digital Signatures. In Proc. of ACM-CCS''99, pp. 138-146
[4] Barkai D., 2001, Peer-to-Peer Computing: Technologies for Sharing and Collaborating on the Net, Intel Press
[5] Benameur H., Chaib-draa B., Kropf P., 2002, "Multi-item auctions for automatic negotiation", INFORMATION AND SOFTWARE TECHNOLOGY,pp291-301
[6] Bradshaw J., 1997, "Software Agents", MIT Press.
[7] Brenner W., Zarnekow R., H. Wittig, 1998, "Intelligent Software Agents:Foundations and Applications", Springer
[8] Chakraborty D., H. Chen., 2000, "Service Discovery in the future for Mobile Commerce", Association for Computing Machinery(ACM)Crossroads, 7(2), pp.18-24
[9] Chida K., Kobayashi K., Morita H., 2001, "Efficient Sealed-Bid Auctions for Massive Numbers of Bidders with Lump Comparison", Proceedings of the 4th International Conference on Information Security, pp.408-419, October 01-03
[10] Cramer R., Shoup V., 1998, A practical public key cryptosystem provably secure against adaptive chosen ciphertextattack, in Advances in Cryptology - CRYPTO 1998., pp. 13-25
[11] Cramton P., 1998, "Ascending Auctions", European Economic Review, pp. 745-756, May
[12] Fensel D., Bussler C., 2002, "The Web Service Modeling Framework WSMF", Electronic Commerce Research and Applications , pp. 113-137
[13] Franklin M.K., Reiter M.K., The Design and Implementation of a Secure Auction Service, IEEE Transactions on Software Engineering, v.22 n.5, p.302-312, May 1996
[14] Genesereth M.R., Ketchpel S.P., 1994, "Software Agents", Communications of the ACM, Vol. 37, No. 7, pp. 48-53.
[15] Guttman R.H., Maes P., 1998, "Cooperative vs. Competitive Multi-Agent Negotiations in Retail Electronic Commerce", Proceedings of the Second International Workshop on Cooperative Information Agents (CIA''98), Paris, France, July 3-8
[16] Imai H., Watanabe Y., 2000, "Reducing the round complexity of a sealed-bid auction protocol with an off-line TTP", Proceedings of the 7th ACM conference on Computer and communications security, pp.80-86, November 01-04
[17] Jepsen T., 2001, "SOAP Cleans Up interoperability Problems on the Web", IEEE IT Professional, pp.52-55, January/February
[18] Jun M., Cai S., 2003, "Key obstacles to EDI success: from the US small manufacturing companies'' perspective", Industrial Management & Data Systems, Vol 103 No 3, pp. 192 -203.
[19] Kikuchi H., Harkavy M., Tygar J.D., "Multi-round anonymous auction", in ''Proceedings of the First IEEE Workshop on Dependable and Real-Time E-Commerce Systems'', pp. 62-69,1998
[20] Kikuchi H., Hotta S., Abe K., Nakanishi S., 2000, "Distributed auction servers resolving winner and winning bid without revealing privacy of bids", proc. of International Workshop on Next Generation Internet (NGITA2000), IEEE, pp. 307-312
[21] Lin F., Hsu J.Y., 1998, "Coordinating Multi-agent Systems by Scripts", Systems, Man, and Cybernetics, IEEE International Conference, Vol. 4, pp. 3442-3447
[22] Maes P., Guttman R.H., Moukas A.G., 1999, "Agents that Buy and Sell: Transforming Commerce as We Know It", Communications of the ACM, Vol.42, No. 3, pp.81-91
[23] Matsuo T., Ito T., 2002, "A Designated Bid Reverse Auction for Agent-Based Electronic Commerce", LNAI 2358, pp. 460-469
[24] Matsuo T., Ito T., 2003, "A Bidders Cooperation Support System for Agent-Based Electronic Commerce", Springer-Verlag Berlin Heidelberg, pp. 369-378
[25] McAfee R.P., McMillan J., 1987, "Auctions and Bidding", Journal of Economic Literature, pp. 699-738, June
[26] Mu Y., Varadharajan V., 2000,An Internet Anonymous Auction Scheme, Proceedings of the Third International Conference on Information Security and Cryptology, pp.171-182, December 08-09
[27] Mukhi N.K., 2001,http://www-106.ibm.com/developerworks/webservices/library/ws-wsif.html
[28] Oliveira E., Fischer K., Stepankova O., 1999, "Multi-agent systems: which research for which applications", Robotics and Autonomous Systems, Vol. 27, pp. 91-106
[29] Omote K., Miyaji A., 2002, "A second-price sealed-bid auction with the discriminant of the p-th root", Financial Cryptography-Proceedings of FC 2002, Springer-Verlag
[30] Peng K., Boyd C., Dawson E., Viswanathan K., 2003, "Five sealed-bid auction models", Proceedings of the Australasian information security workshop conference on ACSW frontiers 2003, Vol. 21, pp.77-86
[31] Roy J., Ramanujan A., 2001, "Understanding Web Services" ,IEEE IT Professional, pp.69-73, September/October
[32] Ruffa S.A., Perozziello M.J., 2000, "Breaking the Cost Barrier: A Proven Approach to Managing and Implementing Lean Manufacturing", Industrial Management and Data Systems, Vol 100 No 9, pp. 459 - 460.
[33] Sako K., 1999, Universally verifiable auction protocol which hides losing bids, In Proc. of SCIS''99 (in Japanese), pp. 35-39
[34] Sako K., 2000, "An Auction Protocol Which Hides Bids of Losers", Proceedings of the Third International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography, pp.422-432, January 18-20
[35] Sakurai K., Miyazaki S., 1999, "A bulletin-board based digital auction scheme with bidding down strategy-towards anonymous electronic bidding without anonymous channels nor trusted centers", Proc. International Workshop on Cryptographic Techniques and E-Commerce, City University of Hong Kong Press, Hong Kong, pp. 180-187
[36] Schnorr C. P., 1990, Efficient identification and signatures for smart cards, Proc. of Crypto''89, Lect. Notes in Comp. Sci., Springer-Verlag, Berlin, pp. 239-252
[37] Selker T., 1994, "Coach: A Teaching Agent that Learns", Communications of the ACM, Vol. 37, No. 7, pp. 92-99.
[38] Shamir A., 1979, How to share a secret, Communication of the ACM, Vol. 22, No.11, pp. 612-613.
[39] SOAP, 2000, http://www.w3.org/TR/SOAP
[40] Suzuki K., Kobayashi K., Morita H., 2000, "Efficient Sealed-Bid Auction Using Hash Chain", Proceedings of the Third International Conference on Information Security and Cryptology, pp.183-191, December 08-09
[41] Sycara K., Decker K., Pannu A.S., M. Williamson, D. Zeng, 1996, "Distributed Intelligent Agents", IEEE Expert
[42] Teich J., Wallenius H., Wallenius J., 1999, "Multiple-Issue Auction and Market Algorithms for the World Wide Web", Decision Support Systems, pp. 49-66
[43] van Heck E., Vervest P., 1998, "How should CIOs deal with Web-Based Auctions?", Communications of the ACM, vol.41, no.7, pp. 99-100, July
[44] Van Slyke C., Belanger F., 2003, "E-Business Technologies: Supporting the net-enhanced organization", John Wiley & Sons, USA.
[45] Vickrey W., 1961, "Counterspeculation, auctions, and Competitive Sealed Tenders", Journal of Finance, Vol. 16, pp. 8-37, March
[46] Viswanathan K., Boyd C., Dawson E., 2000, "A Three Phased Schema for Sealed Bid Auction System Design", Proceedings of the 5th Australasian Conference on Information Security and Privacy, pp.412-426, July 10-12
[47] Weiss R., Steger C., 1998, "Design and Implementation of a Real-time multi-agent system", 9th Mediterranean Electronic Technical Conference, MELECON 98, Vol. 2, pp. 1269-1273
[48] Wooldridge J., Jennings N.R., 1995, "Intelligent Agents: Theory and Practice", The Knowledge Engineering Review, pp. 115~152
[49] Wsdl, 2001, http://www.w3.org/TR/wsdl
[50] 戚玉樑等編著,Web services探索與應用,全華科技圖書股份有限公司,民92
[51] 陳歷鋒,網際網路拍賣機制之初探研究,國立台灣大學商學研究所碩士論文,民89
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top