Providing a Live Chat on Online Shopping with End-to-End Encryption

  • Authors

    • Mr. S.K.Manigandan
    • Mrs. R.Latha
    • Mr. S.MohamedAsik
    • J Velmurugan
    • D Ramya
    2018-09-01
    https://doi.org/10.14419/ijet.v7i3.34.18789
  • Bargain, Decryption, Encryption, Live chat, Products.
  • In our these days life on-line purchase associated e-commerce website   has changing into   an mandatory  things   in  our  daily  life vogue  since,  it conjointly  have  some  major  issue  like  purchasing  a product  with  unhappy  mode  and   lack  of data  in product  usage.  therefore as to  overcome  these  drawback we  have  a tendency to   have new entranceway referred to as   live chat  in on-line looking. We have a tendency to  will  offer    this  live   chat  in  most   safest  method  exploitation   the   end  to  finish cryptography  methodology , most  of  the  looking can  have  a   live  chat however  they Weren’t   provided   a cut price options and most e-commerce website   don’t   have Chat choices.  We have a tendency to will even enable the client and producer to Share their thoughts.

     

     

  • References

    1. [1] G. Draper-Gil, A. H. Lashkari, M. S. I. Mamun, A. A. Ghorbani, "Characterization of encrypted and VPN traffic using time-related features", Proceedings of the 2nd International Conference on Information Systems Security and Privacy(lCISSP), pp. 407-414, 2016.

      [2] Yemei, Talking about online shopping logistics service evaluation ,E-Business Journal,2011,vol.1,no.1,pp.20-25.

      [3] L. Ting, Z. Hongmei, "The Empirical Analysis of Effecting Online Banking Information Security Products Customer Satisfaction", 7th International Conference on Intelligent Human-Machine Systems and Cybernetics (IHMSC), vol. 1, pp. 398-402, 2015.

      [4] Z. Ma, "Assessing Serviceability and Reliability to Affect Customer Satisfaction of Internet Banking", Journal of Software, vol. 7, pp. 1601-1608, July 2012.

      [5] Zuva Tranos, O. Olugbara Oludayo, O. Ojo Sunday, M. Ngwira Seleman, "Image Content in Location-Based Shopping Recommended Systems for mobile users", Advanced Computing: An International Journal (ACIJ), vol. 3, no. 4, July 2012.

      [6] S M Pavalam, S V Kashmir Raja, K Akorli Felix, M Jawahar, "A Survey of Web Crawler Algorithms", IJCSI International Journal of Computer Science Issues, vol. 8, no. 6, November 2011.

      [7] B. O. B. Kamwendo, “Vulnerabilities of signaling system number 7 (ss7) to cyber attacks and how to mitigate against these vulnerabilities. bob kamwendo,†vol. 7, no. 7, 2015.

      [8] A. Kirlik, Adaptive perspectives on human-technology interaction: Methods and models for cognitive engineering and human-computer interaction. Oxford University Press, Inc., 2009.

      [9] P. Velan, M. Cermak, P. Celeda, M. Drasar, "A survey of methods for encrypted traffic classification and analysis", International Journal of Network Management, vol. 25, no. 5, pp. 355-374, 2015

      [10] 10. Z. Cao, G. Xiong, Y. Zhao, Z. Li, L. Guo, "A survey on encrypted traffic classification" in Applications and Techniques in Information Security, Springer, pp. 73-81, 2014

  • Downloads

  • How to Cite

    S.K.Manigandan, M., R.Latha, M., S.MohamedAsik, M., Velmurugan, J., & Ramya, D. (2018). Providing a Live Chat on Online Shopping with End-to-End Encryption. International Journal of Engineering & Technology, 7(3.34), 133-135. https://doi.org/10.14419/ijet.v7i3.34.18789