Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Abstract:
Nowadays, short message service (SMS) is being used in many daily life applications, including
healthcare monitoring, mobile banking, mobile commerce, and so on. But when we send an SMS
from one mobile phone to another, the information contained in the SMS transmit as plain text.
Sometimes this information may be confidential like account numbers, passwords, license
numbers, and so on, and it is a major drawback to send such information through SMS while the
traditional SMS service does not provide encryption to the information before its transmission. In
this paper, we propose an efficient and secure protocol called EasySMS, which provides end-to-
end secure communication through SMS between end users. The working of the protocol is
presented by considering two different scenarios. The analysis of the proposed protocol shows
that this protocol is able to prevent various attacks, including SMS disclosure, over the air
modification, replay attack, man-in-the- middle attack, and impersonation attack. The EasySMS
protocol generates minimum communication and computation overheads as compared with
existing SMSSec and PK-SIM protocols. On an average, the EasySMS protocol reduces 51%
and 31% of the bandwidth consumption and reduces 62% and 45% of message exchanged during
the authentication process in comparison to SMSSec and PK-SIM protocols respectively.
Authors claim that EasySMS is the first protocol completely based on the symmetric key
cryptography and retain original architecture of cellular network.
Short Messaging Service (SMS) is a communication service, originally developed as part of the
Global System for Mobile Communications. Today it is one of the most widely used mobile
services, with million messages exchanged on a daily basis.
Their present-day uses are far different from the initial idea. SMS has now become a popular
means of communication by individuals and businesses. Banks worldwide are using SMS to
conduct some of their banking services. People sometimes exchange confidential information
such as passwords or sensitive data amongst each other. The mobile commerce is everyday
growing.
SMS provides many conveniences in our everyday lives, but is it really secure? SMS messages
are sent via a store-and-forward mechanism to a Short Message Service Centre (SMSC), which
will attempt to send the message to the recipient and possibly retry if the user is not reachable
at a given moment. Transmission of the short messages between SMSC and phone is via the
Signaling System Number 7 (SS7) within the unencrypted protocol allowing employees within
the cellular provider’s network, which has access to SS7 network, to eavesdrop or Modify SMS
messages.
Literature survey
2). D. Risi and M. Teófilo, “MobileDeck: Turning SMS into a rich user experience,” in Proc. 6th
MobiSys, no. 33, 2009.
3)K. Yadav, “SMSAssassin: Crowdsourcing driven mobile-based system for SMS spam filtering,”
in Proc. Workshop Hotmobile, 2011, pp. 1–6.
4) M. Densmore, “Experiences with bulk SMS for health financing in Uganda,” in Proc. ACM
CHI, 2012, pp. 383–398.
Short message service (SMS, aka text messaging) is a low-cost and effective means of
communication for organizations attempting to maintain contact with many people. In this paper
we look at the deployment and of a bulk mobile text-messaging platform (Bulk SMS), conceived
and commissioned by a health non-governmental organization (NGO) for use in communicating
with the 100+ private health facilities. We show how the platform emerged from existing
practices, the features and expectations of the system, and the ways in which it was used.
Common failure points include infrastructural limitations, human error, and unexpected use
cases. We find that 1) the use of SMS as a media enables new types of communication, and 2)
SMS alone is not sufficient for maintaining relationships within the NGO program.
2. Problem Statement
1) Is it best application to properly message is sending from sender to receiver?
2) What is the accuracy of encryption techniques?
System Analysis
3.1 Introduction to System Analysis
System
System Analysis
System analysis and design are the application of the system approach to problem solving
generally using computers. To reconstruct a system the analyst must consider its elements
output and inputs, processors, controls, feedback and environment.
Analysis
Analysis is a detailed study of the various operations performed by a system and their
relationships within and outside of the system. One aspect of analysis is defining the boundaries
of the system and determining whether or not a candidate system should consider other related
systems. During analysis data are collected on the available files decision points and transactions
handled by the present system. This involves gathering information and using structured tools for
analysis.
Existing System:
In existing system whenever you are sending the text message no encryption techniques is used
so whatever data you are sending from source system same to datasets will received as it is.
Proposed System:
In this section, we focus on the selection criteria to choose a block cipher
based symmetric key algorithm. The efficiency of a block cipher algorithm
depends upon the block size and key size. Since, with a larger block size we
can encrypt large chunk of data in one cycle of the algorithm, thus, it speeds
up the execution of algorithm. However, a larger key results in a slower
algorithm, because in general, all bits of key are involved in an execution
cycle of the algorithm.
Advantages:
In Proposed system it contains more secure by using AES encryption.
FEASIBILITY STUDY
Feasibility is the determination of whether or not a project is worth doing. The process followed
in making this determination is called feasibility Study. This type of study if a project can and
should be taken. In the conduct of the feasibility study, the analyst will usually consider seven
distinct, but inter-related types of feasibility.
Technical Feasibility
This is considered with specifying equipment and software that will successful satisfy the user
requirement the technical needs of the system may vary considerably but might include
Economic Feasibility
Economic analysis is the most frequently used technique for evaluating the effectiveness of a
proposed system. More commonly known as cost / benefit analysis. The procedure is to
determine the benefits and savings are expected form a proposed system and a compare them
with costs. It benefits outweigh costs; a decision is taken to design and implement the system
will have to be made if it is to have a chance of being approved. There is an ongoing effort that
improves in accuracy at each phase of the system life cycle.
Operational Feasibility
It is mainly related to human organization and political aspects. These points are considered
are
Processor : 733
Keyboard : 104 Keys
Floppy Drive : 1.44 MB MHz Pentium III
RAM : 128 MB
Hard Disk : 10GB
Monitor : 14” VGA COLOR
Mouse : Logitech Serial Mouse
Disk Space : 1 GB
Design for WebApps encompasses technical and non-technical activities. The look and
feel of content is developed as part of graphic design; the aesthetic layout of the user
interface is created as part of interface design; and the technical structure of the
WebApp is modeled as part of architectural and navigational design.
This argues that a Web engineer must design an interface so that it answers three
primary questions for the end-user:
2. What can I do now? – The interface should always help the user understand
his current options- what functions are available, what links are live, what content is
relevant.
6.2 Design goals – the following are the design goals that are applicable to virtually
every WebApp regardless of application domain, size, or complexity.
1. Simplicity
2. Consistency
3. Identity
4. Visual appeal
5. Compatibility.
Design leads to a model that contains the appropriate mix of aesthetics, content, and
technology. The mix will vary depending upon the nature of the WebApp, and as a
consequence the design activities that are emphasized will also vary.
a. Navigation menus
b. Graphic icons
c. Graphic images
Interface Design work flow- the work flow begins with the identification of user, task,
and environmental requirements. Once user tasks have been identified, user
scenarios are created and analyzed to define a set of interface objects and actions.
2. Aesthetic design-also called graphic design, describes the “look and feel” of the
WebApp. Includes color schemes, geometric layout. Text size, font and placement,
the use of graphics, and related aesthetic decisions.
3. Content design-defines the layout, structure, and outline for all content that is
presented as part of the WebApp. Establishes the relationships between content
objects.
4. Navigation design-represents the navigational flow between contents objects and for
all WebApp functions.
Modules:
Sender module: the user need to select the user from their contact list based,
and provide the necessary text to the user (Receiver) and click on send option. Once the sender
has clicked the send option the message will be encrypted by using AES Encryption.
Receiver module: The user will be receiving the messages in encrypted form,
once user clicks the decrypt then the messages will be decrypted using AES decrption.
Existing system:
An attack model describes different scenarios for the possibilities of various attacks where a malicious MS
can access the authentic information, or misguide the legitimate MS.Since, the SMS is sent as plaintext,
thus network operators can easily access the content of SMS during the transmission at SMSC.
Source Code
package DAO;
import java.sql.Connection;
import java.sql.ResultSet;
import java.sql.Statement;
import java.text.DateFormat;
import java.text.SimpleDateFormat;
import java.util.ArrayList;
import java.util.Date;
import java.util.List;
}
catch(Exception e)
{
System.out.println("Opp's Error is in UserDAO-
addDownloadTransaction(): ");
e.printStackTrace();
}
return flag;
}
public static boolean addencUser(String sid, String rdid, String ori, String enc)
{
boolean flag=false;
int i = 0;
String user = "";
String sql="";
try
{
Database database=Database.getInstance();
connection=database.connector();
statement = connection.createStatement();
sql="INSERT INTO
m_enc(sender_id,reciever_id,original_data,enc_data) VALUES('"+sid+"', '"+rdid+"',
'"+ori+"', '"+enc+"')";
System.out.println(sql);
i = statement.executeUpdate(sql);
if(i>1)
{
flag=true;
}
}
catch(Exception e)
{
System.out.println("Opp's Error is in UserDAO-
addDownloadTransaction(): ");
e.printStackTrace();
}
return flag;
}
public static boolean update(String sid, String rdid, String ori, String enc)
{
boolean flag=false;
int i = 0;
String user = "";
String sql="";
try
{
Database database=Database.getInstance();
connection=database.connector();
statement = connection.createStatement();
sql="update m_enc set original_data= '"+ori+"',
enc_data='"+enc+"' where sender_id='"+sid+"' and reciever_id='"+rdid+"'";
System.out.println(sql);
i = statement.executeUpdate(sql);
if(i>1)
{
flag=true;
}
}
catch(Exception e)
{
System.out.println("Opp's Error is in UserDAO-
addDownloadTransaction(): ");
e.printStackTrace();
}
return flag;
}
}
catch(Exception e)
{
System.out.println("Opp's Error is in UserDAO-
addDownloadTransaction(): ");
e.printStackTrace();
}
return flag;
}
boolean flag=false;
ResultSet rs=null;
String sql="";
try
{
Database database=Database.getInstance();
connection=database.connector();
statement = connection.createStatement();
sql="select * from m_user where user_id = '"+ username + "' and
user_pwd='"+ password + "'";
System.out.println(sql);
rs=statement.executeQuery(sql);
System.out.println(rs);
while(rs.next())
{
flag=true;
}
System.out.println("Download Transaction Status : "+flag);
}
catch(Exception e)
{
System.out.println("Opp's Error is in UserDAO-
addDownloadTransaction(): ");
e.printStackTrace();
}
return flag;
}
boolean flag=false;
ResultSet rs=null;
String sql="";
try
{
Database database=Database.getInstance();
connection=database.connector();
statement = connection.createStatement();
sql="select * from m_user where uname = '"+ username + "' and
urole='"+ role + "'";
System.out.println(sql);
rs=statement.executeQuery(sql);
System.out.println(rs);
while(rs.next())
{
flag=true;
}
System.out.println("Download Transaction Status : "+flag);
}
catch(Exception e)
{
System.out.println("Opp's Error is in UserDAO-
addDownloadTransaction(): ");
e.printStackTrace();
}
return flag;
}
public static boolean CheckUserExistancer(String username, String pass,String r)
{
System.out.println("its came Checkcurrentpassword.....................");
boolean flag=false;
ResultSet rs=null;
String sql="";
try
{
Database database=Database.getInstance();
connection=database.connector();
statement = connection.createStatement();
sql="select * from m_user where uname = '"+ username + "' and
upass='"+pass+"' and urole='"+ r + "'";
System.out.println(sql);
rs=statement.executeQuery(sql);
System.out.println(rs);
while(rs.next())
{
flag=true;
}
System.out.println("Download Transaction Status : "+flag);
}
catch(Exception e)
{
System.out.println("Opp's Error is in UserDAO-
addDownloadTransaction(): ");
e.printStackTrace();
}
return flag;
}
public static boolean CheckdataExistancer(String sid, String rid)
{
System.out.println("its came Checkcurrentpassword.....................");
boolean flag=false;
ResultSet rs=null;
String sql="";
try
{
Database database=Database.getInstance();
connection=database.connector();
statement = connection.createStatement();
sql="select * from m_enc where sender_id = '"+ sid + "' and
reciever_id='"+rid+"'";
System.out.println(sql);
rs=statement.executeQuery(sql);
System.out.println(rs);
while(rs.next())
{
flag=true;
}
System.out.println("Download Transaction Status : "+flag);
}
catch(Exception e)
{
System.out.println("Opp's Error is in UserDAO-
addDownloadTransaction(): ");
e.printStackTrace();
}
return flag;
}
ResultSet rs=null;
String sql="";
List<String> list = null;
try
{
Database database=Database.getInstance();
connection=database.connector();
statement = connection.createStatement();
sql="select cat_name from m_category";
System.out.println(sql);
rs=statement.executeQuery(sql);
System.out.println(rs);
list = new ArrayList<String>();
while(rs.next())
{
list.add(rs.getString(1));
}
System.out.println("category list: " + list);
}
catch(Exception e)
{
System.out.println("Opp's Error is in UserDAO-
addDownloadTransaction(): ");
e.printStackTrace();
}
return list;
}
ResultSet rs=null;
String sql="";
String categoryId = null;
try
{
Database database=Database.getInstance();
connection=database.connector();
statement = connection.createStatement();
sql="select cat_code from m_category where cat_name='"+
categoryName + "' ";
System.out.println(sql);
rs=statement.executeQuery(sql);
System.out.println(rs);
while(rs.next())
{
categoryId = rs.getString(1);
}
System.out.println("category Id : "+categoryId);
}
catch(Exception e)
{
System.out.println("Opp's Error is in UserDAO-
addDownloadTransaction(): ");
e.printStackTrace();
}
return categoryId;
}
public static String getuaername(String role)
{
StringBuffer sb = new StringBuffer();
ResultSet rs=null;
String sql="";
String categoryId = null;
try
{
Database database=Database.getInstance();
connection=database.connector();
statement = connection.createStatement();
sql="select uname from m_user where urole='"+ role + "' ";
System.out.println(sql);
rs=statement.executeQuery(sql);
System.out.println(rs);
while(rs.next())
{
sb.append(rs.getString(1)) ;
sb.append("~") ;
}
System.out.println("category Id : "+categoryId);
}
catch(Exception e)
{
System.out.println("Opp's Error is in UserDAO-
addDownloadTransaction(): ");
e.printStackTrace();
}
return sb.toString();
}
String truncId;
try
{
Database database=Database.getInstance();
connection=database.connector();
statement = connection.createStatement();
sql = "SELECT pr_heart_rate FROM m_patient_reading2 ORDER
BY pr_id DESC limit 10";
System.out.println(sql);
rs=statement.executeQuery(sql);
System.out.println(rs);
while(rs.next())
{
truncId = rs.getString(1);
list.add(truncId);
}
catch(Exception e)
{
System.out.println("Opp's Error is in UserDAO-
addDownloadTransaction(): ");
e.printStackTrace();
}
System.out.println("list"+list);
return list;
}
//getDate
public static List<String> getGetDate()
{
System.out.println("Inside Body");
List<String> list = new ArrayList<String>();
String sql = "";
ResultSet rs=null;
String date;
try
{
Database database=Database.getInstance();
connection=database.connector();
statement = connection.createStatement();
sql = "SELECT r1 FROM m_trans ";
System.out.println(sql);
rs=statement.executeQuery(sql);
System.out.println(rs);
while(rs.next())
{
date = rs.getString(1);
list.add(date);
}
catch(Exception e)
{
System.out.println("Opp's Error is in UserDAO-
addDownloadTransaction(): ");
e.printStackTrace();
}
System.out.println("list"+list);
return list;
}
//getTime
public static List<String> getGetTime()
{
System.out.println("Inside Body");
List<String> list = new ArrayList<String>();
String sql = "";
ResultSet rs=null;
String time;
try
{
Database database=Database.getInstance();
connection=database.connector();
statement = connection.createStatement();
sql = "SELECT pr_accident_shakevakue FROM
m_patient_reading2 ORDER BY pr_id DESC limit 10 ";
System.out.println(sql);
rs=statement.executeQuery(sql);
System.out.println(rs);
while(rs.next())
{
time = rs.getString(1);
list.add(time);
}
}
catch(Exception e)
{
System.out.println("Opp's Error is in UserDAO-
addDownloadTransaction(): ");
e.printStackTrace();
}
System.out.println("list"+list);
return list;
}
//getGetReading1
public static List<String> getGetReading1()
{
System.out.println("Inside Body");
List<String> list = new ArrayList<String>();
String sql = "";
ResultSet rs=null;
String reading1;
try
{
Database database=Database.getInstance();
connection=database.connector();
statement = connection.createStatement();
sql = "SELECT hr_status FROM
m_patient_reading2 ORDER BY pr_id DESC limit 10 ";
System.out.println(sql);
rs=statement.executeQuery(sql);
System.out.println(rs);
while(rs.next())
{
reading1 = rs.getString(1);
list.add(reading1);
}
}
catch(Exception e)
{
System.out.println("Opp's Error is in UserDAO-
addDownloadTransaction(): ");
e.printStackTrace();
}
System.out.println("list"+list);
return list;
}
//Reading2
public static List<String> getGetReading2()
{
System.out.println("Inside Body");
List<String> list = new ArrayList<String>();
String sql = "";
ResultSet rs=null;
String reading2;
try
{
Database database=Database.getInstance();
connection=database.connector();
statement = connection.createStatement();
sql = "SELECT tr_status FROM
m_patient_reading2 ORDER BY pr_id DESC limit 10 ";
System.out.println(sql);
rs=statement.executeQuery(sql);
System.out.println(rs);
while(rs.next())
{
reading2 = rs.getString(1);
list.add(reading2);
}
}
catch(Exception e)
{
System.out.println("Opp's Error is in UserDAO-
addDownloadTransaction(): ");
e.printStackTrace();
}
System.out.println("list"+list);
return list;
}
//Reading3
public static List<String> getGetReading3()
{
System.out.println("Inside Body");
List<String> list = new ArrayList<String>();
String sql = "";
ResultSet rs=null;
String reading2;
try
{
Database database=Database.getInstance();
connection=database.connector();
statement = connection.createStatement();
sql = "SELECT accident_status FROM
m_patient_reading2 ORDER BY pr_id DESC limit 10";
System.out.println(sql);
rs=statement.executeQuery(sql);
System.out.println(rs);
while(rs.next())
{
reading2 = rs.getString(1);
list.add(reading2);
}
}
catch(Exception e)
{
System.out.println("Opp's Error is in UserDAO-
addDownloadTransaction(): ");
e.printStackTrace();
}
System.out.println("list"+list);
return list;
}
package DAO;
import java.sql.Connection;
import java.sql.DriverManager;
} catch (Exception e) {
System.out.println("Opp's Error is in connector()......."+ e);
}
return con;
}
}
DistanceDAO JAVA file
package DAO;
// 1.
/* Best Distance Calculation Formulla(Starts) */
public static double distFrom(double lat1, double lng1, double lat2, double lng2)
{
//double earthRadius = 3958.75;//In Miles
//double earthRadius = 6371;//In Km(Kilo meteres)
double earthRadius = 6371 * 1000;//In m(meter)
double dLat = Math.toRadians(lat2-lat1);
double dLng = Math.toRadians(lng2-lng1);
double a = Math.sin(dLat/2) * Math.sin(dLat/2) +
Math.cos(Math.toRadians(lat1)) * Math.cos(Math.toRadians(lat2)) *
Math.sin(dLng/2) * Math.sin(dLng/2);
double c = 2 * Math.atan2(Math.sqrt(a), Math.sqrt(1-a));
return earthRadius * c;
}
/*
* Passed to function:
* lat1, lon1 = Latitude and Longitude of point 1 (in decimal degrees)
* lat2, lon2 = Latitude and Longitude of point 2 (in decimal degrees)
*
* unit = the unit you desire for results
* where: 'M' is statute miles
* 'K' is kilometers (default)
* 'N' is nautical miles
*/
public static double distance(double lat1, double lon1, double lat2, double lon2,
String unit)
{
double theta = lon1 - lon2;
double dist = Math.sin(deg2rad(lat1)) * Math.sin(deg2rad(lat2)) +
Math.cos(deg2rad(lat1)) * Math.cos(deg2rad(lat2)) * Math.cos(deg2rad(theta));
dist = Math.acos(dist);
dist = rad2deg(dist);
dist = dist * 60 * 1.1515;
if (unit.equals("K"))
{
dist = dist * 1.609344;
}
else if (unit.equals("N"))
{
dist = dist * 0.8684;
}
return (dist);
}
/*
* Test
* system.println(distance(32.9697, -96.80322, 29.46786, -98.53506, "M") + " Miles\n");
* system.println(distance(32.9697, -96.80322, 29.46786, -98.53506, "K") + "
Kilometers\n");
* system.println(distance(32.9697, -96.80322, 29.46786, -98.53506, "N") + " Nautical
Miles\n");
*/
/* //Point2
double lat2 = 12.931912;
double lon2= 77.58345;
*/
/* //Point3
double lat2 = 12.932816;
double lon2= 77.583548;
*/
//Point4
double lat2 = 12.932401;
double lon2= 77.580118;
}
Android Code:
package com.database;
import android.content.Context;
import android.database.sqlite.SQLiteDatabase;
import android.database.sqlite.SQLiteDatabase.CursorFactory;
import android.database.sqlite.SQLiteOpenHelper;
import android.util.Log;
@Override
public void onCreate(SQLiteDatabase _db)
{
_db.execSQL(LoginDataBaseAdapter.DATABASE_CREATE);
_db.execSQL(LoginDataBaseAdapter.DATABASE_CREATE_RULE);
@Override
public void onUpgrade(SQLiteDatabase _db, int _oldVersion, int _newVersion) {
Log.w("TaskDBAdapter", "Upgrading from version " + _oldVersion + " to "
+ _newVersion + ", which will destroy all old data");
_db.execSQL("DROP TABLE IF EXISTS " + "TEMPLATE");
onCreate(_db);
}
package com.database;
import java.util.ArrayList;
import java.util.List;
import android.content.ContentValues;
import android.content.Context;
import android.database.Cursor;
import android.database.SQLException;
import android.database.sqlite.SQLiteDatabase;
+"SENDER_ID text," +
"RECIEVER
_ID text," +
"ENCRYPT
ED_DATA text);";
System.out.println(""+cursor.getString(4)+"|"+cursor.getString(5)+"|"+cursor.getString(6
)+"|"+cursor.getString(7)+"|"+cursor.getString(8)+"|"+cursor.getString(9)+"|"+cursor.get
String(10));
return
cursor.getInt(0)+"~"+cursor.getInt(1)+"~"+cursor.getString(2)+"~"+cursor.getString(3)+"
~"+cursor.getString(4)+"~"+cursor.getString(5)+"~"+cursor.getString(6)+"~"+cursor.getS
tring(7)+"~"+cursor.getString(8)+"~"+cursor.getString(9)+"~"+cursor.getString(10);
}
else
return "NoRecordFound"; // not found
}
return cursor;
}
public long addEncData(String sender, String reciver, String encdata)
{
long i = 0;
String senderid = "";
String reciverid = "";
Cursor c = db.query("m_encdec", new String[] { "*" }, "SENDER_ID=?and
RECIEVER_ID=?", new String[] { sender,reciver }, null, null, null);
if (c.moveToFirst()){
do {
senderid=c.getString(c.getColumnIndex("SENDER_ID"));
reciverid=c.getString(c.getColumnIndex("RECIEVER_ID"));
}while (c.moveToNext());
}
else
{
ContentValues cv = new ContentValues();
cv.put("SENDER_ID", sender);
cv.put("RECIEVER_ID", reciver);
cv.put("ENCRYPTED_DATA", encdata);
i = db.insert("m_encdec", null, cv);
}
return i;
}
/**
* Encrypts the given plain text
*
* @param plainText The plain text to encrypt
*/
public byte[] encrypt(byte[] plainText) throws Exception
{
SecretKeySpec secretKey = new SecretKeySpec(key, ALGORITHM);
Cipher cipher = Cipher.getInstance(ALGORITHM);
cipher.init(Cipher.ENCRYPT_MODE, secretKey);
return cipher.doFinal(plainText);
}
/**
* Decrypts the given byte array
*
* @param cipherText The data to decrypt
*/
public byte[] decrypt(byte[] cipherText) throws Exception
{
SecretKeySpec secretKey = new SecretKeySpec(key, ALGORITHM);
Cipher cipher = Cipher.getInstance(ALGORITHM);
cipher.init(Cipher.DECRYPT_MODE, secretKey);
return cipher.doFinal(cipherText);
}
}
package com.example.senderreciever_app;
import java.util.ArrayList;
import java.util.List;
import java.util.regex.Matcher;
import java.util.regex.Pattern;
import org.apache.http.NameValuePair;
import org.apache.http.message.BasicNameValuePair;
import com.HttpClient.CustomHttpClient;
import com.HttpClient.Global;
import com.database.LoginDataBaseAdapter;
import android.os.Bundle;
import android.os.StrictMode;
import android.view.View.OnClickListener;
import android.app.Activity;
import android.content.Context;
import android.content.Intent;
import android.view.View;
import android.widget.ArrayAdapter;
import android.widget.Button;
import android.widget.EditText;
import android.widget.Spinner;
import android.widget.Toast;
ppp = (Button)findViewById(R.id.pp);
ppp.setOnClickListener(new OnClickListener() {
@Override
public void onClick(View v) {
ip= ipp.getText().toString();
startActivity(il);
}
});
}
public void addListenerOnSpinnerItemSelection(){
spin.setOnItemSelectedListener(new CustomOnItemSelectedListener());
}
// validating email id
private boolean isValidEmail(String email) {
String EMAIL_PATTERN = "^[_A-Za-z0-9-\\+]+(\\.[_A-Za-z0-9-]
+)*@"
+ "[A-Za-z0-9-]+(\\.[A-Za-z0-9]+)*(\\.[A-Za-z]{2,})$";
// validating Phone
public static boolean isValidPhone(String phone)
{
String expression = "[0-9]{10}$";
CharSequence inputString = phone;
Pattern pattern = Pattern.compile(expression);
Matcher matcher = pattern.matcher(inputString);
if (matcher.matches())
{
return true;
}
else{
return false;
}
}
@Override
protected void onDestroy() {
// TODO Auto-generated method stub
super.onDestroy();
loginDataBaseAdapter.close();
}
}
Results
Conclusion
References
4. Daemen, J., Rijmen, V.: The design of Rijndael:AES | the Advanced Encryption
Standard. Springer-Verlag (2002)
5. Hassinen, M., Markovski, S.: Secure sms messaging using quasigroup encryption
7. Lisonek, D., Drahansky, M.: Sms encryption for mobile communication. In: Pro-
ceedings of the 2008 International Conference on Security Technology. pp.
198{ 201. SECTECH '08, IEEE Computer Society, Washington, DC, USA (2008),
http://dx.doi.org/10.1109/SecTech.2008.48
9. RATSHINANGA, H., LO, J., BISHOP, J.: A security mechanism for secure sms
10. Research, C.: Standards for e cient cryptography, SEC 1: Elliptic curve cryptog-
raphy (Sep 2000)