SlideShare a Scribd company logo
1 of 11
Download to read offline
DEVELOPED
PROJECTS
Maria Gligor
Cluj-Napoca 004074670833 mariiagligor@yahoo.com
1. EMAIL ENCRYPTION ON ANDROID USING
DIGITAL CERTIFICATES
Developed Application: K-9 Mail with Encryption
K-9 Mail is a Free/Open-source Android mail application. It is a comprehensive
email client that allows sending and receiving emails from one or multiple accounts. K-9
Mail with Encryption allows sending and receiving email securely by encrypting the
contents. The application was developed using Java programming language on Android
Studio. An overview of the application system is presented in the following figure:
For encrypting the message, a symmetric key is generated which is then encrypted
using the RSA algorithm with the public key of the recipient that was previously stored
in a preference file. If there is no key for the recipient, the message will be signed using
the private key of the sender and the public key of the sender will be appended to the
message.
The message will end up structured at the other end as it can be seen in the
following screenshot, for being able to extract the information needed for decrypting it:
The decrypted message will be displayed appended when the message is open for
reading if the signature was successfully validated (if it was signed):
For starting a new mail in K-9 the compose icon can be tapped from any
screen. On the screen for email composition, the recipient can be added by manually
typing it or pressing and choosing one from the address book. For sending an
encrypted mail, the box for encryption must be checked: . For sending a signed
mail, the box for signing must be checked: . After pressing for sending,
the public key of the recipient is retrieved from the preference file and the steps
described above are applied to the message.
When opening the encrypted or signed message, the signature is being validated.
A successful validation leads to the extraction of the encrypted symmetric key and its
decryption using the recipient’s private key. The last step is to decrypt the message with
the decrypted symmetric key and the original message is appended at the end of the
encrypted message.
This process prevents anyone that is eavesdropping on your conversation from
seeing the message in a readable format. When using a signature, the authenticity of
the message can be established as the private key of the sender is used for signing and
the public key of the sender is used for validating it.
2. LIBRARY
Use Case Specification: Borrow
Brief Description
This use case describes how a subscriber of a library borrows books
Actor: User
Basic Flows
The use case begins when a user wants to borrow books.
1. The user selects to borrow a book
2. The system displays the list of available books and provides the option for searching a
certain book
3. The user selects a book or searches for it manually
4. The user confirms his choice and proceeds with the request or goes back to borrowing other
books
5. The system updates the list of available books and registers the reservation
6. The system displays the confirmation number, the borrowed books and the date of return
7. The use case terminates
Alternate Flows
A1. Search manually
In step 3, if the user searches for a book manually, the system will display the list of books
that contain the string that has been typed, together with the status: borrowed or available.
A2. Maximum 3 books
In step 5, if the user has already three books that he wants to borrow, he is prompted with a
message and cannot select anymore books. He can cancel the request and the use case terminates or
proceeds with the request and the basic flow goes further.
Preconditions
The subscriber has logged in to the system
Postconditions
After a successful request, a new registration is created and the list of available books is updated,
otherwise, there is no change to the database.
Use Case Specification: Return
Brief Description
This use case describes how a user returns books
Actor: User
Basic Flows
The use case begins when a user wants to return books.
1. The user selects to return a book and introduces the user ID
2. The system displays the list of books that are currently borrowed by the given user
3. The user selects the books to be returned
4. The system updates the list of available books
5. The use case terminates
Preconditions
The user has logged in to the system and is of type librarian
Postconditions
After a successful return, the list of available books is updated, otherwise, there is no change to
the database.
Special Requirements
The system must handle 5 concurrent requests.
Class Diagram:
A library offers its subscribers books that can be borrowed. The library has many
terminals where the subscribers can borrow books. In order to use the terminal, the
subscriber must introduce his/her library ID.
After a successful identification, the subscriber sees all the available books:
and may borrow one or more books (no more than three):
After the loan is completed, all the other subscribers using the terminals see the
updated list of available books.
The subscriber can also search for a book, by typing a substring from the title. The
terminal will display all the books from the library containing that substring together
with their status (borrowed or available).
For returning books there is only one terminal. In order to return a book the
subscriber introduces his/her library ID and the book ID. After a successful return the list
of available books is automatically updated.
This application was developed in Microsoft Visual Studio using C# programming
language and it uses the following concepts:
- client/server communication: TCP/IP
- XML documents
- reflection
- persistence: binary files

More Related Content

What's hot

New s ta r chart login
New s ta r chart loginNew s ta r chart login
New s ta r chart loginapril_lamb
 
How to access electronic journals.2
How to access electronic journals.2How to access electronic journals.2
How to access electronic journals.2Sharon Kay Darling
 
No 1 Getting Started with NHS ATHENS
No 1 Getting Started with NHS ATHENSNo 1 Getting Started with NHS ATHENS
No 1 Getting Started with NHS ATHENSAlison Day
 
Sentiment analysis on airlines
Sentiment analysis on airlinesSentiment analysis on airlines
Sentiment analysis on airlinesPiyush Srivastava
 

What's hot (6)

Lib h3lp show
Lib h3lp showLib h3lp show
Lib h3lp show
 
Tracking Emails
Tracking EmailsTracking Emails
Tracking Emails
 
New s ta r chart login
New s ta r chart loginNew s ta r chart login
New s ta r chart login
 
How to access electronic journals.2
How to access electronic journals.2How to access electronic journals.2
How to access electronic journals.2
 
No 1 Getting Started with NHS ATHENS
No 1 Getting Started with NHS ATHENSNo 1 Getting Started with NHS ATHENS
No 1 Getting Started with NHS ATHENS
 
Sentiment analysis on airlines
Sentiment analysis on airlinesSentiment analysis on airlines
Sentiment analysis on airlines
 

Viewers also liked

Las Ventajas del telefono Behold 2
Las Ventajas del telefono Behold 2Las Ventajas del telefono Behold 2
Las Ventajas del telefono Behold 2adriana91235
 
Ici unidad4-tema2-hmi
Ici unidad4-tema2-hmiIci unidad4-tema2-hmi
Ici unidad4-tema2-hmiJuan Gonzalez
 
OBP Medical IMC Plan_No Video
OBP Medical IMC Plan_No VideoOBP Medical IMC Plan_No Video
OBP Medical IMC Plan_No VideoLujia Chen
 
Smalltalk In the Cloud
Smalltalk In the CloudSmalltalk In the Cloud
Smalltalk In the CloudESUG
 
Platforum D2C Conference 24 June 2015: Digital Marketing Guru Panel
Platforum D2C Conference 24 June 2015: Digital Marketing Guru PanelPlatforum D2C Conference 24 June 2015: Digital Marketing Guru Panel
Platforum D2C Conference 24 June 2015: Digital Marketing Guru PanelAcanthus Consulting
 
20120207 prs ib_js_libraries_v02
20120207 prs ib_js_libraries_v0220120207 prs ib_js_libraries_v02
20120207 prs ib_js_libraries_v02Chris Palatinus
 
[Kladd] Faktorisering ved kvadratsetningene
[Kladd] Faktorisering ved kvadratsetningene[Kladd] Faktorisering ved kvadratsetningene
[Kladd] Faktorisering ved kvadratsetningeneElisabeth Engum
 
News Release: Lakeland Resources Acquires Newnham Lake Property
News Release:  Lakeland Resources Acquires Newnham Lake PropertyNews Release:  Lakeland Resources Acquires Newnham Lake Property
News Release: Lakeland Resources Acquires Newnham Lake PropertyLakeland Resources Inc. (TSXv: LK)
 
Heartlands1 clan donald - Bannockburn 2014 (Scotland)
Heartlands1 clan donald - Bannockburn 2014 (Scotland)Heartlands1 clan donald - Bannockburn 2014 (Scotland)
Heartlands1 clan donald - Bannockburn 2014 (Scotland)Connie Sanders
 
2009.10 Wykorzystanie Poczty Elektronicznej - raport SARE
2009.10 Wykorzystanie Poczty Elektronicznej - raport SARE2009.10 Wykorzystanie Poczty Elektronicznej - raport SARE
2009.10 Wykorzystanie Poczty Elektronicznej - raport SAREARBOinteractive Polska
 
Benchmarking para una sala de prensa
Benchmarking para una sala de prensaBenchmarking para una sala de prensa
Benchmarking para una sala de prensaakena
 
CDINFORMA NÚMERO 2635, 30 DE ADAR I DE 5774, 2 DE MARZO DE 2014
CDINFORMA NÚMERO 2635, 30 DE ADAR I DE 5774, 2 DE MARZO DE 2014CDINFORMA NÚMERO 2635, 30 DE ADAR I DE 5774, 2 DE MARZO DE 2014
CDINFORMA NÚMERO 2635, 30 DE ADAR I DE 5774, 2 DE MARZO DE 2014Centro Deportivo Israelita
 

Viewers also liked (20)

Las Ventajas del telefono Behold 2
Las Ventajas del telefono Behold 2Las Ventajas del telefono Behold 2
Las Ventajas del telefono Behold 2
 
Ici unidad4-tema2-hmi
Ici unidad4-tema2-hmiIci unidad4-tema2-hmi
Ici unidad4-tema2-hmi
 
7 pasos para emprender
7 pasos para emprender7 pasos para emprender
7 pasos para emprender
 
OBP Medical IMC Plan_No Video
OBP Medical IMC Plan_No VideoOBP Medical IMC Plan_No Video
OBP Medical IMC Plan_No Video
 
Smalltalk In the Cloud
Smalltalk In the CloudSmalltalk In the Cloud
Smalltalk In the Cloud
 
Platforum D2C Conference 24 June 2015: Digital Marketing Guru Panel
Platforum D2C Conference 24 June 2015: Digital Marketing Guru PanelPlatforum D2C Conference 24 June 2015: Digital Marketing Guru Panel
Platforum D2C Conference 24 June 2015: Digital Marketing Guru Panel
 
Kunturwasi
KunturwasiKunturwasi
Kunturwasi
 
20120207 prs ib_js_libraries_v02
20120207 prs ib_js_libraries_v0220120207 prs ib_js_libraries_v02
20120207 prs ib_js_libraries_v02
 
[Kladd] Faktorisering ved kvadratsetningene
[Kladd] Faktorisering ved kvadratsetningene[Kladd] Faktorisering ved kvadratsetningene
[Kladd] Faktorisering ved kvadratsetningene
 
Herencia
HerenciaHerencia
Herencia
 
News Release: Lakeland Resources Acquires Newnham Lake Property
News Release:  Lakeland Resources Acquires Newnham Lake PropertyNews Release:  Lakeland Resources Acquires Newnham Lake Property
News Release: Lakeland Resources Acquires Newnham Lake Property
 
Revista de Marketing Dental y Gesti
Revista de Marketing Dental y GestiRevista de Marketing Dental y Gesti
Revista de Marketing Dental y Gesti
 
Heartlands1 clan donald - Bannockburn 2014 (Scotland)
Heartlands1 clan donald - Bannockburn 2014 (Scotland)Heartlands1 clan donald - Bannockburn 2014 (Scotland)
Heartlands1 clan donald - Bannockburn 2014 (Scotland)
 
Funding Your Green Home Retrofit Handout
Funding Your Green Home Retrofit HandoutFunding Your Green Home Retrofit Handout
Funding Your Green Home Retrofit Handout
 
2009.10 Wykorzystanie Poczty Elektronicznej - raport SARE
2009.10 Wykorzystanie Poczty Elektronicznej - raport SARE2009.10 Wykorzystanie Poczty Elektronicznej - raport SARE
2009.10 Wykorzystanie Poczty Elektronicznej - raport SARE
 
5ºb
5ºb5ºb
5ºb
 
2008-03-10 Power Service strategy
2008-03-10 Power Service strategy2008-03-10 Power Service strategy
2008-03-10 Power Service strategy
 
Leitlinien für Kathbern
Leitlinien für KathbernLeitlinien für Kathbern
Leitlinien für Kathbern
 
Benchmarking para una sala de prensa
Benchmarking para una sala de prensaBenchmarking para una sala de prensa
Benchmarking para una sala de prensa
 
CDINFORMA NÚMERO 2635, 30 DE ADAR I DE 5774, 2 DE MARZO DE 2014
CDINFORMA NÚMERO 2635, 30 DE ADAR I DE 5774, 2 DE MARZO DE 2014CDINFORMA NÚMERO 2635, 30 DE ADAR I DE 5774, 2 DE MARZO DE 2014
CDINFORMA NÚMERO 2635, 30 DE ADAR I DE 5774, 2 DE MARZO DE 2014
 

Similar to Maria Gligor's Developed Projects

Textbook Exchange 5th Iteration (1)
Textbook Exchange 5th Iteration (1)Textbook Exchange 5th Iteration (1)
Textbook Exchange 5th Iteration (1)anuj_rakheja
 
Library management System
Library management SystemLibrary management System
Library management Systemsaradateja
 
Functionality You are to create an enhanced chat system- In particular.pdf
Functionality You are to create an enhanced chat system- In particular.pdfFunctionality You are to create an enhanced chat system- In particular.pdf
Functionality You are to create an enhanced chat system- In particular.pdfNicholasflqStewartl
 
16 Howto Collect Signoffs
16 Howto Collect Signoffs16 Howto Collect Signoffs
16 Howto Collect SignoffsSWING Software
 
Binary studio academy 2013 php group (egor)
Binary studio academy 2013 php group (egor)Binary studio academy 2013 php group (egor)
Binary studio academy 2013 php group (egor)Binary Studio
 
New PPT Presentation.pptx
New PPT Presentation.pptxNew PPT Presentation.pptx
New PPT Presentation.pptxMalikadil27
 
Connect me 20% presentation
Connect me 20% presentationConnect me 20% presentation
Connect me 20% presentationUsman Iqbal
 
Developing a Comprehensive Library Management System for Tamale Polytechnic
Developing a Comprehensive Library Management System for Tamale PolytechnicDeveloping a Comprehensive Library Management System for Tamale Polytechnic
Developing a Comprehensive Library Management System for Tamale PolytechnicEditor IJCATR
 
Software Development Methodologies Library Management System (Part-1)
Software Development Methodologies Library Management System (Part-1)Software Development Methodologies Library Management System (Part-1)
Software Development Methodologies Library Management System (Part-1)Totan Banik
 
11 Project-Online Library Management System
11 Project-Online Library Management System11 Project-Online Library Management System
11 Project-Online Library Management SystemHeather Strinden
 

Similar to Maria Gligor's Developed Projects (20)

Textbook Exchange 5th Iteration (1)
Textbook Exchange 5th Iteration (1)Textbook Exchange 5th Iteration (1)
Textbook Exchange 5th Iteration (1)
 
Library management System
Library management SystemLibrary management System
Library management System
 
Functionality You are to create an enhanced chat system- In particular.pdf
Functionality You are to create an enhanced chat system- In particular.pdfFunctionality You are to create an enhanced chat system- In particular.pdf
Functionality You are to create an enhanced chat system- In particular.pdf
 
Lis Presentation
Lis PresentationLis Presentation
Lis Presentation
 
DOCUMENTATION
DOCUMENTATIONDOCUMENTATION
DOCUMENTATION
 
16 Howto Collect Signoffs
16 Howto Collect Signoffs16 Howto Collect Signoffs
16 Howto Collect Signoffs
 
Initial reportfinal
Initial reportfinalInitial reportfinal
Initial reportfinal
 
H dip hoffman_r_final
H dip hoffman_r_finalH dip hoffman_r_final
H dip hoffman_r_final
 
Binary studio academy 2013 php group (egor)
Binary studio academy 2013 php group (egor)Binary studio academy 2013 php group (egor)
Binary studio academy 2013 php group (egor)
 
Unit 5
Unit 5Unit 5
Unit 5
 
Module5SADP.pptx
Module5SADP.pptxModule5SADP.pptx
Module5SADP.pptx
 
New PPT Presentation.pptx
New PPT Presentation.pptxNew PPT Presentation.pptx
New PPT Presentation.pptx
 
Book E
Book EBook E
Book E
 
Connect me 20% presentation
Connect me 20% presentationConnect me 20% presentation
Connect me 20% presentation
 
Book E
Book EBook E
Book E
 
Developing a Comprehensive Library Management System for Tamale Polytechnic
Developing a Comprehensive Library Management System for Tamale PolytechnicDeveloping a Comprehensive Library Management System for Tamale Polytechnic
Developing a Comprehensive Library Management System for Tamale Polytechnic
 
library management
library management library management
library management
 
Software Development Methodologies Library Management System (Part-1)
Software Development Methodologies Library Management System (Part-1)Software Development Methodologies Library Management System (Part-1)
Software Development Methodologies Library Management System (Part-1)
 
11 Project-Online Library Management System
11 Project-Online Library Management System11 Project-Online Library Management System
11 Project-Online Library Management System
 
Srs library m s
Srs library m sSrs library m s
Srs library m s
 

Maria Gligor's Developed Projects

  • 2. 1. EMAIL ENCRYPTION ON ANDROID USING DIGITAL CERTIFICATES Developed Application: K-9 Mail with Encryption K-9 Mail is a Free/Open-source Android mail application. It is a comprehensive email client that allows sending and receiving emails from one or multiple accounts. K-9 Mail with Encryption allows sending and receiving email securely by encrypting the contents. The application was developed using Java programming language on Android Studio. An overview of the application system is presented in the following figure: For encrypting the message, a symmetric key is generated which is then encrypted using the RSA algorithm with the public key of the recipient that was previously stored in a preference file. If there is no key for the recipient, the message will be signed using the private key of the sender and the public key of the sender will be appended to the message.
  • 3. The message will end up structured at the other end as it can be seen in the following screenshot, for being able to extract the information needed for decrypting it:
  • 4. The decrypted message will be displayed appended when the message is open for reading if the signature was successfully validated (if it was signed): For starting a new mail in K-9 the compose icon can be tapped from any screen. On the screen for email composition, the recipient can be added by manually typing it or pressing and choosing one from the address book. For sending an encrypted mail, the box for encryption must be checked: . For sending a signed mail, the box for signing must be checked: . After pressing for sending, the public key of the recipient is retrieved from the preference file and the steps described above are applied to the message. When opening the encrypted or signed message, the signature is being validated. A successful validation leads to the extraction of the encrypted symmetric key and its decryption using the recipient’s private key. The last step is to decrypt the message with the decrypted symmetric key and the original message is appended at the end of the encrypted message. This process prevents anyone that is eavesdropping on your conversation from seeing the message in a readable format. When using a signature, the authenticity of the message can be established as the private key of the sender is used for signing and the public key of the sender is used for validating it.
  • 5. 2. LIBRARY Use Case Specification: Borrow Brief Description This use case describes how a subscriber of a library borrows books Actor: User Basic Flows The use case begins when a user wants to borrow books. 1. The user selects to borrow a book 2. The system displays the list of available books and provides the option for searching a certain book 3. The user selects a book or searches for it manually 4. The user confirms his choice and proceeds with the request or goes back to borrowing other books 5. The system updates the list of available books and registers the reservation 6. The system displays the confirmation number, the borrowed books and the date of return 7. The use case terminates Alternate Flows A1. Search manually In step 3, if the user searches for a book manually, the system will display the list of books that contain the string that has been typed, together with the status: borrowed or available.
  • 6. A2. Maximum 3 books In step 5, if the user has already three books that he wants to borrow, he is prompted with a message and cannot select anymore books. He can cancel the request and the use case terminates or proceeds with the request and the basic flow goes further. Preconditions The subscriber has logged in to the system Postconditions After a successful request, a new registration is created and the list of available books is updated, otherwise, there is no change to the database. Use Case Specification: Return Brief Description This use case describes how a user returns books Actor: User Basic Flows The use case begins when a user wants to return books. 1. The user selects to return a book and introduces the user ID 2. The system displays the list of books that are currently borrowed by the given user 3. The user selects the books to be returned 4. The system updates the list of available books 5. The use case terminates Preconditions The user has logged in to the system and is of type librarian Postconditions After a successful return, the list of available books is updated, otherwise, there is no change to the database. Special Requirements The system must handle 5 concurrent requests.
  • 8. A library offers its subscribers books that can be borrowed. The library has many terminals where the subscribers can borrow books. In order to use the terminal, the subscriber must introduce his/her library ID. After a successful identification, the subscriber sees all the available books:
  • 9. and may borrow one or more books (no more than three):
  • 10. After the loan is completed, all the other subscribers using the terminals see the updated list of available books. The subscriber can also search for a book, by typing a substring from the title. The terminal will display all the books from the library containing that substring together with their status (borrowed or available).
  • 11. For returning books there is only one terminal. In order to return a book the subscriber introduces his/her library ID and the book ID. After a successful return the list of available books is automatically updated. This application was developed in Microsoft Visual Studio using C# programming language and it uses the following concepts: - client/server communication: TCP/IP - XML documents - reflection - persistence: binary files