Journal articles on the topic 'Secure e-commerce'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Secure e-commerce.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Cebeci, Sena Efsun, Kubra Nari, and Enver Ozdemir. "Secure E-Commerce Scheme." IEEE Access 10 (2022): 10359–70. http://dx.doi.org/10.1109/access.2022.3145030.
Full textMasadeh, Shadi R., Shadi Aljawarneh, Ashraf Odeh, and Abdullah Alhaj. "Secure Communication." International Journal of Information Security and Privacy 7, no. 4 (2013): 1–10. http://dx.doi.org/10.4018/ijisp.2013100101.
Full textS, Bala Musa, Norita Md Norwawi, and Mohd Hasan Selamat. "Secure E-commerce Web Development Framework." Information Technology Journal 10, no. 4 (2011): 769–78. http://dx.doi.org/10.3923/itj.2011.769.778.
Full textDr. B. Veera Jyothi et al.,, Dr B. Veera Jyothi et al ,. "Smart E-Commerce Application with Secure Blockchain." International Journal of Mechanical and Production Engineering Research and Development 10, no. 3 (2020): 7209–20. http://dx.doi.org/10.24247/ijmperdjun2020682.
Full textAljifri, H., and A. P. Pons. "Reducing Overhead of Secure E-Commerce Transactions." International Journal of Computers and Applications 26, no. 4 (2004): 1–6. http://dx.doi.org/10.1080/1206212x.2004.11441746.
Full textAbbott, Shawn. "The Debate for Secure E[lectronic]Commerce." EDPACS 27, no. 1 (1999): 17–19. http://dx.doi.org/10.1201/1079/43247.27.1.19990701/30254.7.
Full textGuan, Sheng-Uei, and Yang Yang. "SAFE: secure agent roaming for e-commerce." Computers & Industrial Engineering 42, no. 2-4 (2002): 481–93. http://dx.doi.org/10.1016/s0360-8352(02)00042-6.
Full textZhou, Gui Xian, and Ding Yi Zhang. "Trusted Operating Systems for Manufacturing E-Commerce System Secure." Advanced Materials Research 811 (September 2013): 608–12. http://dx.doi.org/10.4028/www.scientific.net/amr.811.608.
Full textFarah, Tawfiq Abdul Hussien, Monem S. Rahma Abdul, and Bahjat Abdul Wahab Hala. "Design and implement a new secure prototype structure of e-commerce system." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 1 (2022): 560–71. https://doi.org/10.11591/ijece.v12i1.pp560-571.
Full textAndeh, Chioma P. R. "Designing A New Framework for Securing Electronic Commerce Systems at Design Phase: With A Special Reference to an Emerging Economy." International Journal of Advances in Scientific Research and Engineering (ijasre) 5, no. 9 (2019): 92–106. https://doi.org/10.31695/IJASRE.2019.33501.
Full textDing, Xia Jun, Xiao Dan Jiang, and Yue Zhai Zheng. "The Research and Implementation of E-Commerce Secure Payment Protocol." Advanced Materials Research 267 (June 2011): 74–79. http://dx.doi.org/10.4028/www.scientific.net/amr.267.74.
Full textKumbhakar, Dulal. "A Secure and Efficient Authentication in E-Commerce." Bioscience Biotechnology Research Communications 14, no. 5 (2021): 93–99. http://dx.doi.org/10.21786/bbrc/14.5/19.
Full textL. Mlelwa, Kenneth. "A Novel Framework for Secure E-Commerce Transactions." International Journal of Cyber-Security and Digital Forensics 6, no. 2 (2017): 92–100. http://dx.doi.org/10.17781/p002273.
Full textNabi, Faisal. "Secure business application logic for e-commerce systems." Computers & Security 24, no. 3 (2005): 208–17. http://dx.doi.org/10.1016/j.cose.2004.08.008.
Full textPrabakar, Ms Sini. "E-COMMERCE WEBSITE USING NEXT.JS." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem46353.
Full textHassan, Md Arif, Zarina Shukur, and Mohammad Kamrul Hasan. "An Efficient Secure Electronic Payment System for E-Commerce." Computers 9, no. 3 (2020): 66. http://dx.doi.org/10.3390/computers9030066.
Full textS, Janani. "Secure Online Seller Registration System." International Journal for Research in Applied Science and Engineering Technology 13, no. 5 (2025): 4696–700. https://doi.org/10.22214/ijraset.2025.71282.
Full textXu, Hong Feng, and Gui Xian Zhou. "Study on the Trusted Operating Technology for Mobile E-Commerce System Secure." Applied Mechanics and Materials 519-520 (February 2014): 416–21. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.416.
Full textSona Josh, Sreelakshmi V, Hajira Hazeena, and Binny S. "E-Commerce Transaction Using Visual Cryptography." international journal of engineering technology and management sciences 7, no. 4 (2023): 634–38. http://dx.doi.org/10.46647/ijetms.2023.v07i04.088.
Full textMiajee, Md Rezaul Karim. "SET for E-commerce Transactions." American International Journal of Sciences and Engineering Research 1, no. 1 (2018): 13–15. http://dx.doi.org/10.46545/aijser.v1i1.22.
Full textPatil, Prof Pradnya, Prof Minal Sonkar, Prof Pallavi Patil, Prof Priyanka Deshmukh, and Prof Trupti Patil. "A Comprehensive Strategy for Detecting Credit Card Fraud in E-Commerce Utilizing DNS Authentication." International Journal of Soft Computing and Engineering 14, no. 5 (2024): 30–35. http://dx.doi.org/10.35940/ijsce.f3656.14051124.
Full textNugraha, Muhammad Adi, Desi Arisandi, and Novario Jaya Perdana. "PENGAMANAN WEBSITE E-COMMERCE MENGGUNAKAN MULTI-FACTOR AUTHENTICATION." Jurnal Ilmu Komputer dan Sistem Informasi 9, no. 1 (2021): 158. http://dx.doi.org/10.24912/jiksi.v9i1.11588.
Full textWakoli, Leonard W. "Secure Sockets Layer/Transport Layer Security for E-Commerce." International Journal of Scientific Research and Management (IJSRM) 12, no. 12 (2024): 8047–52. https://doi.org/10.18535/ijsrm/v12i12.em03.
Full textProf., Pradnya Patil. "A Comprehensive Strategy for Detecting Credit Card Fraud in E-Commerce Utilizing DNS Authentication." International Journal of Soft Computing and Engineering (IJSCE) 14, no. 5 (2024): 30–35. https://doi.org/10.35940/ijsce.F3656.14051124.
Full textTawfiq Abdul Hussien, Farah, Abdul Monem S. Rahma, and Hala Bahjat Abdul Wahab. "A Secure E-commerce Environment Using Multi-agent System." Intelligent Automation & Soft Computing 34, no. 1 (2022): 499–514. http://dx.doi.org/10.32604/iasc.2022.025091.
Full textSingh, Charanjit, and Mark N. Frolick. "Ibuttons: Building the Infrastructure for More Secure E-commerce." Information Systems Security 8, no. 4 (2000): 1–8. http://dx.doi.org/10.1201/1086/43307.8.4.20000101/31079.6.
Full textYang, Cungang. "Designing secure e-commerce with role-based access control." International Journal of Web Engineering and Technology 3, no. 1 (2007): 73. http://dx.doi.org/10.1504/ijwet.2007.011528.
Full textSugiantoro, Bambang, Muhammad Anshari, and Danang Sudrajat. "Developing Framework for Web Based e-Commerce: Secure-SDLC." Journal of Physics: Conference Series 1566 (June 2020): 012020. http://dx.doi.org/10.1088/1742-6596/1566/1/012020.
Full textGuan, Zhitao, Naiyu Wang, Xunfeng Fan, Xueyan Liu, Longfei Wu, and Shaohua Wan. "Achieving Secure Search over Encrypted Data for e-Commerce." ACM Transactions on Internet Technology 21, no. 1 (2021): 1–17. http://dx.doi.org/10.1145/3408309.
Full textKumar, Ashish, Kakali Chatterjee, and Ashish Singh. "Energy-Efficient Secure Architecture For Personalization E-Commerce WSN." IEEE Transactions on Consumer Electronics 70, no. 4 (2024): 6901–8. https://doi.org/10.1109/tce.2024.3424574.
Full textKumar, Dr Narendra, Rohit Yadav, Vishal Khandelwal, and Shubham Gupta. "E-Commerce Website Using Mern Stack." International Journal of All Research Education and Scientific Methods 13, no. 05 (2025): 1645–50. https://doi.org/10.56025/ijaresm.2025.1305251645.
Full textRajashekarappa, Dr, Gautam Hegde, Gowtam Anant Hegde, Tanishq Hegde K. S, and Vishal Kattimani. "Decentralized E-Commerce for Digital Assets." International Journal for Research in Applied Science and Engineering Technology 12, no. 3 (2024): 2098–102. http://dx.doi.org/10.22214/ijraset.2024.59283.
Full textChoon, Keat LOW, Chi PHOON Gar, and Phing NG Yen. "Developing a Secure E-commerce Web Application for Online Fashion Store." Research and Applications of Web Development and Design 7, no. 2 (2024): 1–5. https://doi.org/10.5281/zenodo.10745953.
Full textPatankar, Rutwij. "TrenchX An Integrated Marketplace for Secure E-Commerce and NFT Transactions." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem34964.
Full textTubishat, Bassam Mustafa Abdul-Rahman. "Electronic Commerce and Consumer Protection in Jordan: The Emerging Trend." International Journal of Religion 5, no. 2 (2024): 328–45. http://dx.doi.org/10.61707/n26a5837.
Full textد. ياسر تاج السر محمد سند та د. حنان حسين عيسى كرم. "دور نظام الرقابة الداخلية في تأمين عمليات التجارة الإلكترونية". Omdurman Islamic University Journal 33, № 1 (2021): 194–226. http://dx.doi.org/10.52981/oiuj.v33i1.788.
Full textBadekar, Sakshi. "E-Commerce for Local Shop." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem50944.
Full textSavya, Savya, R. Mohanraj, K. Sharada, Savya Sachi, K. Neelima, and Punyala Ramadevi. "Securing the Digital Commerce Spectrum and Cyber Security Strategies for Web, E-commerce, M-commerce, and E-mail Security." Journal of Cybersecurity and Information Management 14, no. 1 (2024): 34–49. http://dx.doi.org/10.54216/jcim.140103.
Full textThilagavathi, J., and K. Lavanya. "E-Commerce on Emerging Markets." Shanlax International Journal of Arts, Science and Humanities 11, S3-July (2024): 61–64. http://dx.doi.org/10.34293/sijash.v11is3-july.7920.
Full textOreoluwa Omoike. "Designing a secure and high-performing e-commerce platform for public cloud." International Journal of Science and Research Archive 9, no. 2 (2023): 1008–13. http://dx.doi.org/10.30574/ijsra.2023.9.2.0525.
Full textSuradi, Agustinus. "Blockchain and AI Technology Convergence: Applications in E-Commerce." Journal of Information System, Technology and Engineering 2, no. 3 (2024): 269–79. http://dx.doi.org/10.61487/jiste.v2i3.71.
Full textSaeed, Saqib. "A Customer-Centric View of E-Commerce Security and Privacy." Applied Sciences 13, no. 2 (2023): 1020. http://dx.doi.org/10.3390/app13021020.
Full textWang, Yi Ran. "Research of E-Business Security Based on SOAP Protocol." Advanced Materials Research 189-193 (February 2011): 4304–7. http://dx.doi.org/10.4028/www.scientific.net/amr.189-193.4304.
Full textPiscevic, Milos, and Dejan Simic. "Reducing e-commerce risks using digital certificates." Yugoslav Journal of Operations Research 19, no. 1 (2009): 185–94. http://dx.doi.org/10.2298/yjor0901185p.
Full textBoerkamp, Martijn. "Quantum-secure online shopping moves a step closer." Physics World 37, no. 3 (2024): 6i. http://dx.doi.org/10.1088/2058-7058/37/03/06.
Full textPeng, Xiang Jun, and Juan Juan Chen. "The Problems of Mobile E-Commerce Secure Payment and Solutions." Applied Mechanics and Materials 443 (October 2013): 561–65. http://dx.doi.org/10.4028/www.scientific.net/amm.443.561.
Full textSÜZEN, Ahmet Ali, and Burhan DUMAN. "Blockchain-Based Secure Credit Card Storage System for E-Commerce." Sakarya University Journal of Computer and Information Sciences 4, no. 2 (2021): 204–15. http://dx.doi.org/10.35377/saucis.04.02.895764.
Full textBackhouse, James. "Assessing Certification Authorities: Guarding the Guardians of Secure E‐commerce?" Journal of Financial Crime 9, no. 3 (2002): 217–26. http://dx.doi.org/10.1108/eb026020.
Full textKodaganallur, Viswanathan. "Secure E-Commerce: Understanding the Public Key Cryptography Jigsaw Puzzle." Information Systems Security 14, no. 6 (2006): 44–52. http://dx.doi.org/10.1201/1086.1065898x/45782.14.6.20060101/91859.9.
Full textGuitart, Jordi, David Carrera, Vicenç Beltran, Jordi Torres, and Eduard Ayguadé. "Designing an overload control strategy for secure e-commerce applications." Computer Networks 51, no. 15 (2007): 4492–510. http://dx.doi.org/10.1016/j.comnet.2007.05.010.
Full text