IJCOPE Journal

UGC Logo DOI / ISO Logo

International Journal of Creative and Open Research in Engineering and Management

A Peer-Reviewed, Open-Access International Journal Supporting Multidisciplinary Research, Digital Publishing Standards, DOI Registration, and Academic Indexing.
Journal Information
ISSN: 3108-1754 (Online)
Crossref DOI: Available
ISO Certification: 9001:2015
Publication Fee: 599/- INR
Compliance: UGC Journal Norms
License: CC BY 4.0
Peer Review: Double Blind
Volume 02, Issue 04

Published on: April 2026

E-MAIL SECURITY AND AUTHENTICATION

Syeda Zeba Qureshi Taha Asjad Mir Ahmed Ali Mohammed Abdul Moeed Mohammed Islamul Haq

Adeeba Anjum

CSE(Data Science)/Lords Institute of Engineering and Technology Osmania University Hyderabad India

Article Status

Plagiarism Passed Peer Reviewed Open Access

Available Documents

Abstract

E-mail is a widely used communication medium in today’s digital world, but it lacks a reliable way to confirm whether a message has been delivered or read. This creates uncertainty for users, especially in important communications. To address this limitation, a system is proposed that provides a message tracking feature, allowing senders to know the status of their e-mails, such as delivery and opening. This enhances trust and effectiveness in communication.

At the same time, Online Social Networks (OSNs) face issues related to unwanted or inappropriate content appearing on users’ personal spaces. Current platforms offer limited control over such posts. To solve this problem, a system is introduced that enables users to manage and filter messages on their walls using customizable rules. These rules allow users to define what type of content is acceptable.

In addition, a Machine Learning-based classifier is used to automatically analyze and categorize messages, supporting intelligent filtering. This approach improves content control, user privacy, and overall experience in both e-mail communication and social networking platforms.

Keywords— E-mail Tracking ; Message Receipt System ; Online Social Networks(OSNs) ; Content Filtering ; Machine Learning Classifier.

How to Cite this Paper

Qureshi, S. Z., Asjad, T., Ali, M. A., Moeed, M. A. & Haq, M. I. (2026). E-mail Security and Authentication. International Journal of Creative and Open Research in Engineering and Management, <i>02</i>(04). https://doi.org/10.55041/ijcope.v2i3.285

Qureshi, Syeda, et al.. "E-mail Security and Authentication." International Journal of Creative and Open Research in Engineering and Management, vol. 02, no. 04, 2026, pp. . doi:https://doi.org/10.55041/ijcope.v2i3.285.

Qureshi, Syeda,Taha Asjad,Mir Ali,Mohammed Moeed, and Mohammed Haq. "E-mail Security and Authentication." International Journal of Creative and Open Research in Engineering and Management 02, no. 04 (2026). https://doi.org/https://doi.org/10.55041/ijcope.v2i3.285.

Search & Index

References


  1. Komanduri, M. L. Mazurek, R. Shay, and P.Kelley, “Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms,” IEEE Symposium on Security and Privacy, 2012.

  2. Arunprakash and T. R. Gokul, “Network Security: Overcome Password Hacking Through Graphical Password Authentication,” National Conference on Innovations in Emerging Technology, 2011.

  3. Palmer, “Ethical Hacking,” IBM Systems Journal, vol. 40, no. 3, 2001.

  4. Smith, W. Yurcich, and D. Doss, “Ethical Hacking: The Security Justification Redux,” IEEE International Symposium on Technology and Society, 2012.

  5. Anand, P. Jain, N. Kumar, and R. Rastogi, “Security Analysis and Implementation of Three- Level Security System Using Image-Based Authentication,” International Conference on Modeling and Simulation, 2012.

  6. Zuo and B. Panda, “Network Viruses: Their Working Principles and Marriages with Hacking Programs,” IEEE Information Assurance Workshop, 2013.

  7. Putri, A. A. Dewi, P. Prima, S. Ahmad, andSalman, “Analysis and Comparison of MD5 and SHA-1 Algorithm Implementation in Simple- O Authentication-Based Security System,” International Conference on Quality in Research (QiR), 2013.

  8. Sathish, K. Srinivasa Rao, and A. Gupta,Hacking Secrets, 2012, pp. 8–26.

  9. Fadia, Email Hacking: Even You Can Hack, Vikas Publishing House, 2012, pp. 77–89.

Ethical Compliance & Review Process

  • All submissions are screened under plagiarism detection.
  • Review follows editorial policy.
  • Authors retain copyright.
  • Peer Review Type: Double-Blind Peer Review
  • Published on: Apr 02 2026
CCBYNC

This article is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License. You are free to share and adapt this work for non-commercial purposes with proper attribution.

View License
Scroll to Top