Published on: April 2026
E-MAIL SECURITY AND AUTHENTICATION
Syeda Zeba Qureshi Taha Asjad Mir Ahmed Ali Mohammed Abdul Moeed Mohammed Islamul Haq
Adeeba Anjum
Article Status
Available Documents
Abstract
At the same time, Online Social Networks (OSNs) face issues related to unwanted or inappropriate content appearing on users’ personal spaces. Current platforms offer limited control over such posts. To solve this problem, a system is introduced that enables users to manage and filter messages on their walls using customizable rules. These rules allow users to define what type of content is acceptable.
In addition, a Machine Learning-based classifier is used to automatically analyze and categorize messages, supporting intelligent filtering. This approach improves content control, user privacy, and overall experience in both e-mail communication and social networking platforms.
Keywords— E-mail Tracking ; Message Receipt System ; Online Social Networks(OSNs) ; Content Filtering ; Machine Learning Classifier.
How to Cite this Paper
Qureshi, S. Z., Asjad, T., Ali, M. A., Moeed, M. A. & Haq, M. I. (2026). E-mail Security and Authentication. International Journal of Creative and Open Research in Engineering and Management, <i>02</i>(04). https://doi.org/10.55041/ijcope.v2i3.285
Qureshi, Syeda, et al.. "E-mail Security and Authentication." International Journal of Creative and Open Research in Engineering and Management, vol. 02, no. 04, 2026, pp. . doi:https://doi.org/10.55041/ijcope.v2i3.285.
Qureshi, Syeda,Taha Asjad,Mir Ali,Mohammed Moeed, and Mohammed Haq. "E-mail Security and Authentication." International Journal of Creative and Open Research in Engineering and Management 02, no. 04 (2026). https://doi.org/https://doi.org/10.55041/ijcope.v2i3.285.
References
- Komanduri, M. L. Mazurek, R. Shay, and P.Kelley, “Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms,” IEEE Symposium on Security and Privacy, 2012.
- Arunprakash and T. R. Gokul, “Network Security: Overcome Password Hacking Through Graphical Password Authentication,” National Conference on Innovations in Emerging Technology, 2011.
- Palmer, “Ethical Hacking,” IBM Systems Journal, vol. 40, no. 3, 2001.
- Smith, W. Yurcich, and D. Doss, “Ethical Hacking: The Security Justification Redux,” IEEE International Symposium on Technology and Society, 2012.
- Anand, P. Jain, N. Kumar, and R. Rastogi, “Security Analysis and Implementation of Three- Level Security System Using Image-Based Authentication,” International Conference on Modeling and Simulation, 2012.
- Zuo and B. Panda, “Network Viruses: Their Working Principles and Marriages with Hacking Programs,” IEEE Information Assurance Workshop, 2013.
- Putri, A. A. Dewi, P. Prima, S. Ahmad, andSalman, “Analysis and Comparison of MD5 and SHA-1 Algorithm Implementation in Simple- O Authentication-Based Security System,” International Conference on Quality in Research (QiR), 2013.
- Sathish, K. Srinivasa Rao, and A. Gupta,Hacking Secrets, 2012, pp. 8–26.
- Fadia, Email Hacking: Even You Can Hack, Vikas Publishing House, 2012, pp. 77–89.
Ethical Compliance & Review Process
- •All submissions are screened under plagiarism detection.
- •Review follows editorial policy.
- •Authors retain copyright.
- •Peer Review Type: Double-Blind Peer Review
- •Published on: Apr 02 2026
This article is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License. You are free to share and adapt this work for non-commercial purposes with proper attribution.

