Providing a Live Chat on Online Shopping with End-to-End Encryption
-
2018-09-01 https://doi.org/10.14419/ijet.v7i3.34.18789 -
Bargain, Decryption, Encryption, Live chat, Products. -
Abstract
In our these days life on-line purchase associated e-commerce website  has changing into  an mandatory things  in our daily life vogue since, it conjointly have some major issue like purchasing a product with unhappy mode and  lack of data in product usage. therefore as to overcome these drawback we have a tendency to  have new entranceway referred to as  live chat in on-line looking. We have a tendency to will offer   this live  chat in most  safest method exploitation  the  end to finish cryptography methodology , most of the looking can have a  live chat however they Weren’t  provided  a cut price options and most e-commerce website  don’t  have Chat choices. We have a tendency to will even enable the client and producer to Share their thoughts.
Â
Â
-
References
[1] G. Draper-Gil, A. H. Lashkari, M. S. I. Mamun, A. A. Ghorbani, "Characterization of encrypted and VPN traffic using time-related features", Proceedings of the 2nd International Conference on Information Systems Security and Privacy(lCISSP), pp. 407-414, 2016.
[2] Yemei, Talking about online shopping logistics service evaluation ,E-Business Journal,2011,vol.1,no.1,pp.20-25.
[3] L. Ting, Z. Hongmei, "The Empirical Analysis of Effecting Online Banking Information Security Products Customer Satisfaction", 7th International Conference on Intelligent Human-Machine Systems and Cybernetics (IHMSC), vol. 1, pp. 398-402, 2015.
[4] Z. Ma, "Assessing Serviceability and Reliability to Affect Customer Satisfaction of Internet Banking", Journal of Software, vol. 7, pp. 1601-1608, July 2012.
[5] Zuva Tranos, O. Olugbara Oludayo, O. Ojo Sunday, M. Ngwira Seleman, "Image Content in Location-Based Shopping Recommended Systems for mobile users", Advanced Computing: An International Journal (ACIJ), vol. 3, no. 4, July 2012.
[6] S M Pavalam, S V Kashmir Raja, K Akorli Felix, M Jawahar, "A Survey of Web Crawler Algorithms", IJCSI International Journal of Computer Science Issues, vol. 8, no. 6, November 2011.
[7] B. O. B. Kamwendo, “Vulnerabilities of signaling system number 7 (ss7) to cyber attacks and how to mitigate against these vulnerabilities. bob kamwendo,†vol. 7, no. 7, 2015.
[8] A. Kirlik, Adaptive perspectives on human-technology interaction: Methods and models for cognitive engineering and human-computer interaction. Oxford University Press, Inc., 2009.
[9] P. Velan, M. Cermak, P. Celeda, M. Drasar, "A survey of methods for encrypted traffic classification and analysis", International Journal of Network Management, vol. 25, no. 5, pp. 355-374, 2015
[10] 10. Z. Cao, G. Xiong, Y. Zhao, Z. Li, L. Guo, "A survey on encrypted traffic classification" in Applications and Techniques in Information Security, Springer, pp. 73-81, 2014
-
Downloads
-
How to Cite
S.K.Manigandan, M., R.Latha, M., S.MohamedAsik, M., Velmurugan, J., & Ramya, D. (2018). Providing a Live Chat on Online Shopping with End-to-End Encryption. International Journal of Engineering & Technology, 7(3.34), 133-135. https://doi.org/10.14419/ijet.v7i3.34.18789Received date: 2018-09-02
Accepted date: 2018-09-02
Published date: 2018-09-01