Twitsper; Tweeting Privately Over Secure Connections
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 114

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 5, May 2014

Twitsper; Tweeting Privately Over Secure Connections

R. Sangeetha

OSN today gives some type of privacy controls to protect a users shared information from other users; these controls are insufficiently expressive to provides fine protection. We introduce Twitsper to support control over who sees a user messages in Twitter. Twitsper gives privacy controls to the users of Twitter without depending on Twitter to make changes. This is because it is a wrapper in the Twitter that starts or enables private communication while preserving Twitters originality.

Keywords: witter, video calling, security, Data transmission packet, Private twitting

Edition: Volume 3 Issue 5, May 2014

Pages: 1369 - 1371

Share this Article

How to Cite this Article?

R. Sangeetha, "Twitsper; Tweeting Privately Over Secure Connections", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=20132096, Volume 3 Issue 5, May 2014, 1369 - 1371

Enter Your Email Address




Similar Articles with Keyword 'witter'

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 1213 - 1218

Sentiment Analysis of Twitter Data to Analyze the Acceptance of Aadhaar

Aarushi Thakral, Vasantha W. B.

Share this Article

Downloads: 7

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 778 - 782

A Helpline Application in COVID-19 Pandemic Situation

G. Muni Venkatesh

Share this Article

Downloads: 104

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1945 - 1949

Efficient Image Retrieval Using Sparse Codewords

Pooja V. Baravkar, Gayatri M. Bhandari

Share this Article

Downloads: 105

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 2037 - 2039

Traffic Detection Using Tweets on Twitter Social Network

Supriya Bhosale, Sucheta Kokate

Share this Article

Downloads: 106

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 942 - 944

Quantifying Qualitative Analysis for Collaborations in Enhanced Virtual Social Platforms

P. Siva Kumar, K. Srikanth

Share this Article

Similar Articles with Keyword 'security'

Downloads: 1

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article

Downloads: 1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 1240 - 1249

Secure Methods for Supplychain Management to Protect from Attacks in Blockchain

B. Ratnakanth, K. Venkata Ramana

Share this Article

Downloads: 2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article



Top