• Title/Summary/Keyword: Reseller

Search Result 5, Processing Time 0.022 seconds

A Verifiable and Traceable Secondhand Digital Media Market Protocol

  • Chen, Chin-Ling;Chen, Chin-Chang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.8
    • /
    • pp.1472-1491
    • /
    • 2011
  • As used product transactions are currently on the rise, the demand for transactions of secondhand digital content will grow in the future; thus, learning to make secure transactions while avoiding cyber attacks becomes an important issue. In this paper, we combine the new buyer's secret key, the new buyer's watermark to embed in resold digital content, and the reseller's encrypted watermark, which can prove legal ownership of the reseller. Using the privacy homomorphism property of RSA and exponential calculus, the original seller of digital content can verify the legality of the reseller and the new buyer. We also reduced the load of encryption/decryption digital content using a partial encryption/decryption algorithm to make our protocol more efficient and practical. In the proposed protocol, the seller is not able to conduct piracy and easily frame any other innocent secondhand buyer when a case of piracy is found. In fact, piracy can be clearly traced using the privacy homomorphism property of RSA and the embedded watermark mechanism. Further, in the proposed protocol, the seller himself can trace the piracy using exponential calculus. Since it is unnecessary to trust third party participation, the conspiracy problem is resolved and the new buyer is not required to participate in the dispute. Moreover, the seller, reseller and new buyer can simultaneously benefit from the secondhand transaction.

Service-based Competitive Effects in Austrian Fixed Telecommunication Market (호주 유선시장의 서비스기반 경쟁효과)

  • 김병운
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.10a
    • /
    • pp.27-30
    • /
    • 2003
  • The introduction of reseller In Australian Fixed Telecommunication Market resulted in the reduction of Telstra's local call market share by 13 percent and average fall rate was reduced. Thus, Telstra increased basic rate at 14.5 percent to compensate loss revenue in the local call market. With the deployment of carrier pre-selection of long distance and international calls, it reduced long distance rate at 23.5 percent and international tall rate at 53 percent, and increased the Churn rate. Therefore, the deployment of service-based competition brought efficient results for long distance and international call market. However, LM market created 13.4 percent reduction in call rates, complications in charge system, technical barriers and the preference of one-bill by customers.

  • PDF

The Meaning of Resell Activities Using the Online Second-hand Platform (온라인 중고 거래 플랫폼을 활용한 리셀의 의미)

  • Juha Park;Jaehoon Chun
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.47 no.5
    • /
    • pp.822-838
    • /
    • 2023
  • Reselling, an activity of purchasing high-scarcity products and selling them back at high prices, has gained popularity among those in their 20s and 30s in recent years. This study examines the resell activity process of the MZ generation using the online second-hand platform and its inherent meaning. Interviews with 15 participants in their 20s and 30s showed that respondents have four purchase stages: being influenced by social media, collecting and comparing information using various social media, purchasing efforts, and post-purchase behavior. The research derived three inherent meanings of resell activities: (1) means of self-presentation and differentiation, (2) confirmation of investment skills and aptitude to lead fashion trends, and (3) pleasure of consumption. Respondents indicated meeting self-satisfaction through public selfies on social media. In addition, they emphasized the empirical pleasure during the buying journey by collecting product information, comparing prices, and negotiating with buyers. Our findings confirm the spread of resell activities from minority groups to enthusiastic youth. This study is significant for focusing on fashion products that attract attention in the resell market and examining the respondents' consumption experiences from various perspectives.

Efficiency and Productivity on ICT Industry (ICT 제조업과 서비스업의 효율성과 생산성)

  • Jeong, Boon-Do
    • International Commerce and Information Review
    • /
    • v.16 no.4
    • /
    • pp.55-75
    • /
    • 2014
  • Non-parametric method such as technology efficiency, DEA/Window model and Malmquist Productivity Index (MPI) are used to measure efficiency and productivity of ICT (Information and Communication Technology) manufacturing industry and service industry over the period 2007-2011. The results of this paper indicate following: (1) Technology efficiency of the ICT manufacturing industry were found as the range of 0.34 and 0.39 over the sample period. Technology efficiency of the ICT service industry were found as the range of 0.16 and 0.20 over the sample period. (2) The geometric average of the Malmquist TFP indexes on ICT manufacturing industry indicated the productivity improvement an average of 8.3 percent. The geometric average of the Malmquist TFP indexes on ICT service industry indicated the productivity improvement an average of 1.6 percent. (3) TIER analysis result on ICT manufacturing industry showed that optimal bench marking made by storage devices${\rightarrow}$wireless communication equipment${\rightarrow}$broadcasting equipment${\rightarrow}$radio, recording and playback devices${\rightarrow}$computers, printers, video and audio-visual equipment path. TIER analysis result on ICT service industry indicated that optimal bench marking made by computers and packaged software${\rightarrow}$wired communication${\rightarrow}$communication, information, detection equipment${\rightarrow}$consulting and construction for computer systems integration${\rightarrow}$industrial machinery and equipment rental${\rightarrow}$telecommunications reseller${\rightarrow}$system software development and delivery${\rightarrow}$hosting path.

  • PDF

Security Analysis and Improvement of an Anonymous Asymmetric Fingerprinting Scheme with Trusted Third Party (익명적 비대칭 핑거프린팅 기법의 보안 취약성 분석 및 개선 방안)

  • Kwon, Sae-Ran
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.5
    • /
    • pp.396-403
    • /
    • 2009
  • An anonymous asymmetric fingerprinting protocol combined with watermarking techniques, is one of the copyright protection technologies keeping both right of a seller and that of a buyer, where a seller and an anonymous buyer perform such a protocol that employs various cryptographic tools in order that the seller does not know the exact watermarked copy that the buyer receives, while inserting an invisible non-removable fingerprint i.e., each different unique watermark, into each copy of the digital content to be sold. In such a protocol innocent buyers are kept anonymous during transactions, however, the unlawful reseller is unambiguously identified with a real identity as a copyright violator. In 2007, Yong and Lee proposed an anonymous asymmetric fingerprinting scheme with trusted third party. In this paper we point out the weakness of their scheme such as: the buyer with intention can remove the fingerprint in the watermarked content, because he/she can decrypt the encrypted fingerprint with a symmetric key using man-in-the-middle-attack; a real identity of a buyer can be revealed to the seller through the identification process even though he/she is honest. Furthermore, we propose an improved secure and efficient anonymous asymmetric fingerprinting scheme which enables to reduce the number of communication between the participants.