Abstract: A Novel Model for S.M.S Security and SPAM Detection
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064

Downloads: 107

Research Paper | Computer Science & Engineering | India | Volume 5 Issue 1, January 2016

A Novel Model for S.M.S Security and SPAM Detection

Nikhila Zalpuri

Short message service (S. M. S) security is a very important issue in todays time. In spite of the fact that instant messengers have become very popular, S. M. S is still used. S. M. S is prone to several attacks and is not yet marked as a safe means for communication. Security in S. M. S includes message authentication, user authentication, encryption and decryption of the message and Spam detection. This paper provides a model which provides security for all these aspects of S. M. S. It is found that when this model is implemented the accuracy of is 94 %.

Keywords: SMS, spam, ElGamal, ann, SVM, HMAC

Edition: Volume 5 Issue 1, January 2016

Pages: 1604 - 1610

Share this Article

How to Cite this Article?

Nikhila Zalpuri, "A Novel Model for S.M.S Security and SPAM Detection", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV152816, Volume 5 Issue 1, January 2016, 1604 - 1610

Enter Your Email Address


Similar Articles with Keyword 'SMS'

Downloads: 174 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, Bangladesh, Volume 5 Issue 6, June 2016

Pages: 1523 - 1527

Multifunctional Remote Controlled Robot Using Android Application

T. A. Mithu, T. S. Reddy

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Similar Articles with Keyword 'spam'

Downloads: 2

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 863 - 865

Detection of Malicious URLs using Classification Algorithm

Muskan V. Jaiswal, Dr. Anjali B. Raut

Share this Article

Downloads: 5 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 866 - 868

Detecting and Blocking of Malicious URL

Muskan V. Jaiswal, Anjali B. Raut

Share this Article

Similar Articles with Keyword 'ElGamal'

Downloads: 109

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1204 - 1208

Privacy-Preserving Public Auditing for Secure Cloud Storage using ElGamal Public Key Encryption Algorithm

Rahul Vijay Badhe, Shriniwas Gadage

Share this Article

Downloads: 111

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2334 - 2337

Providing Sender Anonymity with Message Authentication in Sensor Networks using Elliptic Curve Digital Signature Algorithm

Priya T V, Sreerag B M

Share this Article

Similar Articles with Keyword 'ann'

Downloads: 156

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017

Pages: 338 - 384

Managing Uncertainty in Supply Chain Operating Cost Using Genetic Algorithm

Dr. Niju P. Joseph, Dr. Priyanka Surendran

Share this Article

Downloads: 155 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Similar Articles with Keyword 'SVM'

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 1188 - 1193

Profit Contribution of Bank Customer from Different Business Liabilities

Vinod Desai, Shalini B Ullagaddi, Vittal A Odeyar

Share this Article

Downloads: 6 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 314 - 318

Parkinson Disease Detection Using Machine Learning Algorithms

Yatharth Nakul, Ankit Gupta, Hritik Sachdeva

Share this Article

Similar Articles with Keyword 'HMAC'

Downloads: 121

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 6, June 2013

Pages: 379 - 381

A Novel Security Model For Password Stealing And Password Reuse Attacks

P.Kasthuri, R.Kokila

Share this Article

Downloads: 136

Research Paper, Computer Science & Engineering, Iraq, Volume 6 Issue 12, December 2017

Pages: 576 - 579

MMAC: Fast and Secure Message Authentication

Mohammed Ali Mohammed, Loay K. Abood, Makki Maliki

Share this Article
Top