Submit Search
Upload
IRJET - E-Commerce Website With Enhanced Security
•
0 likes
•
14 views
IRJET Journal
Follow
https://irjet.net/archives/V7/i3/IRJET-V7I3293.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 4
Download now
Download to read offline
Recommended
IRJET - Chrome Extension for Detecting Phishing Websites
IRJET - Chrome Extension for Detecting Phishing Websites
IRJET Journal
Application Security framework for Mobile App Development in Enterprise Setup
Application Security framework for Mobile App Development in Enterprise Setup
Eswar Publications
IRJET - Secure Banking Application with Image and GPS Location
IRJET - Secure Banking Application with Image and GPS Location
IRJET Journal
IRJET- Detecting Phishing Websites using Machine Learning
IRJET- Detecting Phishing Websites using Machine Learning
IRJET Journal
Flaws in Oauth 2.0 Can Oauth be used as a Security Server
Flaws in Oauth 2.0 Can Oauth be used as a Security Server
ijtsrd
CERT STRATEGY TO DEAL WITH PHISHING ATTACKS
CERT STRATEGY TO DEAL WITH PHISHING ATTACKS
csandit
Why Passwords are not strong enough
Why Passwords are not strong enough
EMC
ANDROID APPLICATION FOR PASSWORDLESS LOGIN FOR WEB APPLICATIONS
ANDROID APPLICATION FOR PASSWORDLESS LOGIN FOR WEB APPLICATIONS
Journal For Research
Recommended
IRJET - Chrome Extension for Detecting Phishing Websites
IRJET - Chrome Extension for Detecting Phishing Websites
IRJET Journal
Application Security framework for Mobile App Development in Enterprise Setup
Application Security framework for Mobile App Development in Enterprise Setup
Eswar Publications
IRJET - Secure Banking Application with Image and GPS Location
IRJET - Secure Banking Application with Image and GPS Location
IRJET Journal
IRJET- Detecting Phishing Websites using Machine Learning
IRJET- Detecting Phishing Websites using Machine Learning
IRJET Journal
Flaws in Oauth 2.0 Can Oauth be used as a Security Server
Flaws in Oauth 2.0 Can Oauth be used as a Security Server
ijtsrd
CERT STRATEGY TO DEAL WITH PHISHING ATTACKS
CERT STRATEGY TO DEAL WITH PHISHING ATTACKS
csandit
Why Passwords are not strong enough
Why Passwords are not strong enough
EMC
ANDROID APPLICATION FOR PASSWORDLESS LOGIN FOR WEB APPLICATIONS
ANDROID APPLICATION FOR PASSWORDLESS LOGIN FOR WEB APPLICATIONS
Journal For Research
CTI Tokenization Concepts 160408B
CTI Tokenization Concepts 160408B
Patrick Maroney
50120130405019
50120130405019
IAEME Publication
IRJET- Identification of Clone Attacks in Social Networking Sites
IRJET- Identification of Clone Attacks in Social Networking Sites
IRJET Journal
EFFECTIVE IN-HOUSE VOTING AND VERIFICATION USING BLOCK CHAIN IMPLEMENTATION
EFFECTIVE IN-HOUSE VOTING AND VERIFICATION USING BLOCK CHAIN IMPLEMENTATION
IJTRET-International Journal of Trendy Research in Engineering and Technology
An Anti-Phishing Framework Based on Visual Cryptography
An Anti-Phishing Framework Based on Visual Cryptography
IRJET Journal
RSA Monthly Online Fraud Report -- February 2014
RSA Monthly Online Fraud Report -- February 2014
EMC
Analyst Report: The Digital Universe in 2020 - China
Analyst Report: The Digital Universe in 2020 - China
EMC
IRJET- Customer Feedback Analysis using Machine Learning
IRJET- Customer Feedback Analysis using Machine Learning
IRJET Journal
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
CMR WORLD TECH
50120130406020
50120130406020
IAEME Publication
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...
IRJET Journal
Top gdpr assessment tools
Top gdpr assessment tools
Rajivarnan R
IRJET- Multi Design - Pattern React Application with Django Backend
IRJET- Multi Design - Pattern React Application with Django Backend
IRJET Journal
IRJET- Website Health Checker
IRJET- Website Health Checker
IRJET Journal
Phishing Website Detection Paradigm using XGBoost
Phishing Website Detection Paradigm using XGBoost
IRJET Journal
IRJET- Virtual Business Analyst using a Progressive Web Application
IRJET- Virtual Business Analyst using a Progressive Web Application
IRJET Journal
IRJET- Search Engine Optimization (Seo)
IRJET- Search Engine Optimization (Seo)
IRJET Journal
Retrospect of Search Engine Optimization Techniques
Retrospect of Search Engine Optimization Techniques
IRJET Journal
Calculating Rank of Web Documents Using Its Content and Link Analysis
Calculating Rank of Web Documents Using Its Content and Link Analysis
IRJET Journal
IRJET- Detecting the Phishing Websites using Enhance Secure Algorithm
IRJET- Detecting the Phishing Websites using Enhance Secure Algorithm
IRJET Journal
IRJET - Monitoring Best Product using Data Mining Technique
IRJET - Monitoring Best Product using Data Mining Technique
IRJET Journal
11.0001www.iiste.org call for paper. quality control solutions for niche mark...
11.0001www.iiste.org call for paper. quality control solutions for niche mark...
Alexander Decker
More Related Content
What's hot
CTI Tokenization Concepts 160408B
CTI Tokenization Concepts 160408B
Patrick Maroney
50120130405019
50120130405019
IAEME Publication
IRJET- Identification of Clone Attacks in Social Networking Sites
IRJET- Identification of Clone Attacks in Social Networking Sites
IRJET Journal
EFFECTIVE IN-HOUSE VOTING AND VERIFICATION USING BLOCK CHAIN IMPLEMENTATION
EFFECTIVE IN-HOUSE VOTING AND VERIFICATION USING BLOCK CHAIN IMPLEMENTATION
IJTRET-International Journal of Trendy Research in Engineering and Technology
An Anti-Phishing Framework Based on Visual Cryptography
An Anti-Phishing Framework Based on Visual Cryptography
IRJET Journal
RSA Monthly Online Fraud Report -- February 2014
RSA Monthly Online Fraud Report -- February 2014
EMC
Analyst Report: The Digital Universe in 2020 - China
Analyst Report: The Digital Universe in 2020 - China
EMC
IRJET- Customer Feedback Analysis using Machine Learning
IRJET- Customer Feedback Analysis using Machine Learning
IRJET Journal
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
CMR WORLD TECH
50120130406020
50120130406020
IAEME Publication
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...
IRJET Journal
Top gdpr assessment tools
Top gdpr assessment tools
Rajivarnan R
What's hot
(12)
CTI Tokenization Concepts 160408B
CTI Tokenization Concepts 160408B
50120130405019
50120130405019
IRJET- Identification of Clone Attacks in Social Networking Sites
IRJET- Identification of Clone Attacks in Social Networking Sites
EFFECTIVE IN-HOUSE VOTING AND VERIFICATION USING BLOCK CHAIN IMPLEMENTATION
EFFECTIVE IN-HOUSE VOTING AND VERIFICATION USING BLOCK CHAIN IMPLEMENTATION
An Anti-Phishing Framework Based on Visual Cryptography
An Anti-Phishing Framework Based on Visual Cryptography
RSA Monthly Online Fraud Report -- February 2014
RSA Monthly Online Fraud Report -- February 2014
Analyst Report: The Digital Universe in 2020 - China
Analyst Report: The Digital Universe in 2020 - China
IRJET- Customer Feedback Analysis using Machine Learning
IRJET- Customer Feedback Analysis using Machine Learning
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
50120130406020
50120130406020
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...
Top gdpr assessment tools
Top gdpr assessment tools
Similar to IRJET - E-Commerce Website With Enhanced Security
IRJET- Multi Design - Pattern React Application with Django Backend
IRJET- Multi Design - Pattern React Application with Django Backend
IRJET Journal
IRJET- Website Health Checker
IRJET- Website Health Checker
IRJET Journal
Phishing Website Detection Paradigm using XGBoost
Phishing Website Detection Paradigm using XGBoost
IRJET Journal
IRJET- Virtual Business Analyst using a Progressive Web Application
IRJET- Virtual Business Analyst using a Progressive Web Application
IRJET Journal
IRJET- Search Engine Optimization (Seo)
IRJET- Search Engine Optimization (Seo)
IRJET Journal
Retrospect of Search Engine Optimization Techniques
Retrospect of Search Engine Optimization Techniques
IRJET Journal
Calculating Rank of Web Documents Using Its Content and Link Analysis
Calculating Rank of Web Documents Using Its Content and Link Analysis
IRJET Journal
IRJET- Detecting the Phishing Websites using Enhance Secure Algorithm
IRJET- Detecting the Phishing Websites using Enhance Secure Algorithm
IRJET Journal
IRJET - Monitoring Best Product using Data Mining Technique
IRJET - Monitoring Best Product using Data Mining Technique
IRJET Journal
11.0001www.iiste.org call for paper. quality control solutions for niche mark...
11.0001www.iiste.org call for paper. quality control solutions for niche mark...
Alexander Decker
Phishing Website Detection Using Machine Learning
Phishing Website Detection Using Machine Learning
IRJET Journal
IRJET- Opinion Summarization using Soft Computing and Information Retrieval
IRJET- Opinion Summarization using Soft Computing and Information Retrieval
IRJET Journal
IRJET- Sentimental Prediction of Users Perspective through Live Streaming : T...
IRJET- Sentimental Prediction of Users Perspective through Live Streaming : T...
IRJET Journal
IRJET- Advanced Phishing Identification Technique using Machine Learning
IRJET- Advanced Phishing Identification Technique using Machine Learning
IRJET Journal
IRJET- Phishing Website Detection based on Machine Learning
IRJET- Phishing Website Detection based on Machine Learning
IRJET Journal
IRJET - Digital Advertisement using Artificial Intelligence for Data Anal...
IRJET - Digital Advertisement using Artificial Intelligence for Data Anal...
IRJET Journal
IRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTP
IRJET Journal
Touch With Industry
Touch With Industry
IRJET Journal
DEVELOPMENT OF A RANKING ALGORITHM FOR SEARCH ENGINE OPTIMIZATION
DEVELOPMENT OF A RANKING ALGORITHM FOR SEARCH ENGINE OPTIMIZATION
IJCSIT Journal
Product Comparison Website using Web scraping and Machine learning.
Product Comparison Website using Web scraping and Machine learning.
IRJET Journal
Similar to IRJET - E-Commerce Website With Enhanced Security
(20)
IRJET- Multi Design - Pattern React Application with Django Backend
IRJET- Multi Design - Pattern React Application with Django Backend
IRJET- Website Health Checker
IRJET- Website Health Checker
Phishing Website Detection Paradigm using XGBoost
Phishing Website Detection Paradigm using XGBoost
IRJET- Virtual Business Analyst using a Progressive Web Application
IRJET- Virtual Business Analyst using a Progressive Web Application
IRJET- Search Engine Optimization (Seo)
IRJET- Search Engine Optimization (Seo)
Retrospect of Search Engine Optimization Techniques
Retrospect of Search Engine Optimization Techniques
Calculating Rank of Web Documents Using Its Content and Link Analysis
Calculating Rank of Web Documents Using Its Content and Link Analysis
IRJET- Detecting the Phishing Websites using Enhance Secure Algorithm
IRJET- Detecting the Phishing Websites using Enhance Secure Algorithm
IRJET - Monitoring Best Product using Data Mining Technique
IRJET - Monitoring Best Product using Data Mining Technique
11.0001www.iiste.org call for paper. quality control solutions for niche mark...
11.0001www.iiste.org call for paper. quality control solutions for niche mark...
Phishing Website Detection Using Machine Learning
Phishing Website Detection Using Machine Learning
IRJET- Opinion Summarization using Soft Computing and Information Retrieval
IRJET- Opinion Summarization using Soft Computing and Information Retrieval
IRJET- Sentimental Prediction of Users Perspective through Live Streaming : T...
IRJET- Sentimental Prediction of Users Perspective through Live Streaming : T...
IRJET- Advanced Phishing Identification Technique using Machine Learning
IRJET- Advanced Phishing Identification Technique using Machine Learning
IRJET- Phishing Website Detection based on Machine Learning
IRJET- Phishing Website Detection based on Machine Learning
IRJET - Digital Advertisement using Artificial Intelligence for Data Anal...
IRJET - Digital Advertisement using Artificial Intelligence for Data Anal...
IRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTP
Touch With Industry
Touch With Industry
DEVELOPMENT OF A RANKING ALGORITHM FOR SEARCH ENGINE OPTIMIZATION
DEVELOPMENT OF A RANKING ALGORITHM FOR SEARCH ENGINE OPTIMIZATION
Product Comparison Website using Web scraping and Machine learning.
Product Comparison Website using Web scraping and Machine learning.
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
ranjana rawat
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
ssuser5c9d4b1
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
SIVASHANKAR N
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
KurinjimalarL3
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
upamatechverse
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
rknatarajan
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Suman Mia
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
upamatechverse
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
RajaP95
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
RajaP95
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
upamatechverse
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
pranjaldaimarysona
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
slot gacor bisa pakai pulsa
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Call Girls in Nagpur High Profile
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
Suhani Kapoor
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
Suhani Kapoor
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Dr.Costas Sachpazis
Recently uploaded
(20)
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
IRJET - E-Commerce Website With Enhanced Security
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1583 E-Commerce Website with Enhanced Security Dr.S.Brindha1, Ms.K.Sudha2, A. Anu shree3, A. Jai jansi4, G. Nandhini5 1 HOD, Dept. of computer networking, psg polytechnic college, Tamil nadu, India 2 Professor, Dept. of computer networking, psg polytechnic college, Tamil nadu, India 3,4,5Student, Dept. of computer networking, psg polytechnic college, Tamil nadu, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - E-commerce websites enable the distribution, selling, buying, marketingandservicingofproductsorservices over the internet. It helps to reduce costs while reaching a wider market. The primary goal of an e-commerce site is to sell goods and services in online. People can buy goods or products in online just by visiting website and ordering the items in online by making payments on online. In existing systems, there is always a threat to digital wallet due to hackers. E-commerce digital marketing with enhanced security is provided to prevent the websitefromhackers. Inthe proposed system, security at the transaction time is provided. Both OTP and e-mail messages to verify the user to secure the user account. But, in existing system they either sendOTPore- mail messages to verify the user account. In this way it makes e-commerce system more secure and preventthewebsitefrom unauthentic operations. Further, the product reachability by advertising and digital marketing strategies are provided. Search Engine Optimization (SEO) techniques are also added to make the website easily reachable by the people. Key Words: E-Commerce market, one time password, Security, Search engine optimization, Payment gateway. 1. INTRODUCTION E-commerce enhances efficiencyandflexibilityofthetrading activities. It minimizes the distance issues of trade. It allows user to view catalogues remotely. This system is beneficial for online e-commerce application as well as application for financial institutions. It is also required by several web applications. The demand of online buying is increasing day by day. The identification and authentication of a personal using cryptography, provides high assurance in its security model. We have a tendency to plan associatedegreeformula for enhancing the safety of OTP. SEO (Search Engine Optimization) is the development of subsequent the principle of the search engine such as site structure, webpage language and interaction diplomatic strategies for the balanced planning to improve the site search performance in the search engine and increasing the opportunity of customerdiscoveryandaccesstothewebsite. Fig-1.1 process of ecommerce 2. EXISTING SYSTEM In existing systems, there is always a threat to digital wallet due to hackers. E- Commerce digital marketing with enhanced security is provided to prevent the website from hackers. They either send OTP or e-mail messages to verify the user account. The existing system only provides text- based interface, which is not as user-friendly as Graphical user Interface. 2.1Disadvantages in Existing System a) The existing system can reach large numbers of users and their friends to spread spam, b) The existing system can obtain users’ personal information such as email address, home town, and gender, and etc. c) The existing system can “re-produce" by making other malicious apps popular. 3. PROPOSED SYSTEM In the proposed system, security at the transaction time is provided. In this we introduce a method to send both OTP and e-mail messages to verify the user to secure the user account. But, in existing system they either send OTP or e- mail messages to verify the user account. In this way we make e-commerce system more secure and prevent the website from unauthentic operations. Further, the product reachability by advertising and digital marketing strategies are provided. Search Engine Optimization (SEO) techniques
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1584 are also added to make the website easily reachable by the people. 3.1 Language(s) or Software tools used MySQL (My Structured Query Language) Java script and PHP (Hypertext pre-processor) HTML (Hypertext Markup Language) CSS (cascading style sheet) The above are the required software tools tobuilda website. Product details will be entered to the database using MySQL software. Further security features include OTP, email verification. 3.2 Authentication Method In authentication we used OTP method. Static passwords have been in use which is vulnerable to attacks such asreply attack. One Time Password (OTP) is a particular kind of password that is valid only for only one login session or transaction. OTP provides a secure way for user authentication as it becomes invalid when used beyond the prescribed time frame. High level of randomness is the significant propertyrequiredforOTPs.Truerandomness can be generated from real-world parameters that can produce unpredictable variations in its output. This paper presents an embedded hardware OTP generation system based on remote request via DTMF signals. The proposed hardware uses a confluence of real-world parameters and software- based chaotic function on an embedded platform for OTP generation. The proposed system also facilitates change in the generation of OTPs via discretionary external inputs from users. Fig -3.1 OTP process In OTP process is our cloud server generates 12 bit OTP in that we programed for separating 6 bit OTP number for SMS and another 6 bit OTP number for email verification. 3.3 Search Engine Optimization SEO (Search Engine Optimization) is the development of subsequent the principle of the search engine such as site structure, webpage language and interaction diplomatic strategies for the balanced planning to improve the site search performance in the search engine and increasing the opportunity of customerdiscoveryandaccesstothewebsite. SEO is a scientific developmentidea andmethodology,which develops beside with the development of search engine,and promotes the development of search engines at the same time. The major factors for good ranking positions in all the main search engines are: 3.3.1On-page optimization Matching web page content and key phrases or keywords searched. The main factors to optimize web pages are keyword and key phrases density, keyword formatting, putting keywords in anchor text and the document meta- data (page title tags, Meta description tags, Meta keyword tags etc.). Each web page on some website should have different title tag, Meta tag description and Meta tag keywords. The number of timesthekeyphraseisrepeatedin the text of the web page is a key factor in determining the position for a key phrase. 3.3.2 External links (back links, backward links) and inbound links Google and other search engine counts link to a page from another website as vote for this page. In other words, web pages and websites with more external links from other websites will be ranked more highly. The quality of external links is also very important factor, so if links from other web pages are from a website with a good reputation and with relevant content and key phrases, then this ismorevaluable. Many of web focused companies should improve this aspect of search engine optimization in process called external link building and internal link architecture. Web centered companies should always try to get links from web pages with the higher Page Rank (PR) or from web pages witha PR rating at least four. Page Rank is a scale between 0 and 10 used by Google to determine the importance of websites according to the number and quality of inbound links and external links (back links). Incoming or external links to website should always come in natural textual form, rather than in graphic form (Banner adds images etc.). Google and other search engines does index or evaluate image links, but without textual links web companies won’tincreasewebsite rank or popularity. The Domain name maturity,Internal link structure, URL structure, Bounce rate etc. factors are very important for good ranking position in the search engine. 3.3.3 Off Page optimization This is the technique for making back links. Back links are normally termed as link back from other website to our
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1585 website. Back links are important for SEO because search engine algorithms give credit, if any website has large number of back links. As well as back links increase, website popularity will increase. Fig-3.2 Search Engine Optimization Process 4. RESULT 4.1 User Process Fig -4.1 product listing in user site Fig -4.2 payment process 4.2 Authentication Process Fig 4.3 OTP SMS Fig 4.4 E-Mail OTP
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1586 Fig-4.5 verification process in user site 4.3 Admin Process Fig 4.6 Order Status Fig -4.7 Order Accepted Status Fig -4.8 User Information 5. CONCLUSION Here we have proposed a security ass transaction time. We know that during e-commerce transaction, the security threat get increased. In this we make e-commerce system more secure and prevent the website from unauthentic operations. Thus we have implemented successfully with OTP verification using SMS and Email messages. REFERENCES [1] Purva Goyal “ImplementationonEnhancingSecurityofE- commerce Site for Digital Marketing “, Volume 3,2018. [2] Vinitha Stephie. V and M. Lakshmi,” Design and implementation of e-commerce web application”,vol.12, no. 16, august 2017. [3] Shashank Narayan Srivastava1, Suhani Kshatriya2, Rajkumar Singh Rathore3 “Search Engine Optimizationin E- Commerce Sites”, Volume: 04 Issue: 05 ,May -2017. [4] V.Srikanth "Ecommerce online securityandtrustmarks". IJCET ISSN 0976 – 6375, Volume 3, Issue 2, July- September (2012).
Download now