International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 5, May 2014

Twitsper; Tweeting Privately Over Secure Connections

R. Sangeetha

OSN today gives some type of privacy controls to protect a users shared information from other users; these controls are insufficiently expressive to provides fine protection. We introduce Twitsper to support control over who sees a user messages in Twitter. Twitsper gives privacy controls to the users of Twitter without depending on Twitter to make changes. This is because it is a wrapper in the Twitter that starts or enables private communication while preserving Twitters originality.

Keywords: witter, video calling, security, Data transmission packet, Private twitting

Edition: Volume 3 Issue 5, May 2014

Pages: 1369 - 1371


How to Cite this Article?

R. Sangeetha, "Twitsper; Tweeting Privately Over Secure Connections", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=20132096, Volume 3 Issue 5, May 2014, 1369 - 1371

11 PDF Views | 11 PDF Downloads

Download Article PDF

Video Lecture of Above Article is Not Available Yet

You be the First to Request! Press the Button below!



Similar Articles with Keyword 'witter'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1369 - 1371

Twitsper; Tweeting Privately Over Secure Connections

R. Sangeetha

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1566 - 1570

Design and Implementation of K-Means and Hierarchical Document Clustering on Hadoop

Y. K. Patil, Prof. V. S. Nandedkar

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 234 - 238

Survey on Content Based Face Image Retrieval and Attribute Detection

Bharti S. Satpute, Archana A. Chaugule

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1825 - 1828

Link-Anomaly Detection in Twitter Streams

Shari P S

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 942 - 944

Quantifying Qualitative Analysis for Collaborations in Enhanced Virtual Social Platforms

P. Siva Kumar, K. Srikanth

Share this article

Similar Articles with Keyword 'security'

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 1, January 2013

Pages: 729 - 732

Secure One Time Password Generation for Website Security using Mobile Phone with Biometrics

C. Josy Nambickai Rani, Linda Joseph, E.R.Naganathan

Share this article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 2, February 2013

Pages: 171 - 174

Qualitative Analysis of Security Issues using Firewalls

Piyush Kashiyani, Karthik Chawda

Share this article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 3, March 2013

Pages: 168 - 172

Launch Time Application Security: The Trusted Approach

Renu Mary Daniel, Angela Francis, Vinodh Ewards S. E.

Share this article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 80 - 82

Enhancement of Security for Data Storage in Cloud

M. Hemaanand, K.Varalakshmi

Share this article

Comparative Studies, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 150 - 154

Comparative Analysis of Various Biometric Techniques for Database Security

Harpreet Saini, Kanwal Garg

Share this article

Top