Abstract
The mobile commerce is ability to conduct commerce using mobile devices. This paper describes a detailed mobile commerce framework based on the customer query. The proposed model finds customer requirements based on query, which is made by the customer over the network. The system finds the customer product information and sends to the intended customer. The customer can choose the product, which he/she wants and based on that, the transaction has executed. Both the customer and vender will execute their transaction in a secured manner through the mobile phones.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Antonio, C., Gian, P.P., Giaovanni, V.: Designing Distributed Applications with Mobile Code Paradigms. In: Proc. of International Conference on Software Engineering, pp. 22–32 (2007)
Dasgupta, P., Narasimhan, N., Moser, L.E., Melliar-Smith, P.M.: MAgNET: Mobile Agents for Networked Electronic Trading. IEEE Trans.on Knowledge and Data Engineering, Special Issue on Web Applications, 120–125 (2002)
Alfonso, F., Gian Pietro, P., Giovanni, V.: Understanding Code Mobility. IEEE Trans. on Software Engineering 24(5), 92–98 (1998)
Johansen, D.: Mobile Agent Applicability. In: Rothermel, K., Hohl, F. (eds.) MA 1998. LNCS, vol. 1477, pp. 9–11. Springer, Heidelberg (1998)
Kotz, D., Gray, R.S.: Mobile Code: The Future of the Internet. In: Proc of Workshop on Mobile Agents in Context of Competition and Cooperation at Autonomous Agents, pp. 6–12 (2001)
Lange, D., Oshima, M.: Mobile Agents with Java: The Aglet API. Special Issue on Distributed World Wide Web Processing: Applications and Techniques of Web Agents, 75–83 (2003)
Stavros, P., George, S., Evaggelia, P.: Mobile Agents for WWW Distributed Database Access. In: Proc. of IEEE International Conference on Data Engineering, pp. 75–83 (2005)
Burrows, M., Abadi, M., Needham, R.: A Logic of Authentication. ACM Transactions on Computer Systems 8(1), 85–92 (2004)
Dolev, D., Yao, A.C.: The Security of Public Key Protocols. In: Proc of IEEE Symposium on Foundations of Computer Science, pp. 140–145 (2000)
Catherine, M.: Formal Methods for Cryptographic Protocol Analysis: Emerging Issues and Trends. IEEE Journal on Selected Areas in Communication 21(1), 44–54 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Varaprasad, G. (2009). Query Based Approach Model for Mobile Commerce Applications in Manet. In: Ślęzak, D., Kim, Th., Chang, A.CC., Vasilakos, T., Li, M., Sakurai, K. (eds) Communication and Networking. FGCN 2009. Communications in Computer and Information Science, vol 56. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-10844-0_51
Download citation
DOI: https://doi.org/10.1007/978-3-642-10844-0_51
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-10843-3
Online ISBN: 978-3-642-10844-0
eBook Packages: Computer ScienceComputer Science (R0)