Twitsper; Tweeting Privately Over Secure Connections
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Research Paper | Computer Science & Engineering | India | Volume 3 Issue 5, May 2014

Twitsper; Tweeting Privately Over Secure Connections

R. Sangeetha

OSN today gives some type of privacy controls to protect a users shared information from other users; these controls are insufficiently expressive to provides fine protection. We introduce Twitsper to support control over who sees a user messages in Twitter. Twitsper gives privacy controls to the users of Twitter without depending on Twitter to make changes. This is because it is a wrapper in the Twitter that starts or enables private communication while preserving Twitters originality.

Keywords: witter, video calling, security, Data transmission packet, Private twitting

Edition: Volume 3 Issue 5, May 2014

Pages: 1369 - 1371

Share this Article

How to Cite this Article?

R. Sangeetha, "Twitsper; Tweeting Privately Over Secure Connections", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=20132096, Volume 3 Issue 5, May 2014, 1369 - 1371

47 PDF Views | 42 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'witter'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 1888 - 1890

Spammer Detection and Identification on Social Network Using Machine Learning

Dr. Shameem Akhter, Noorain Saba

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1945 - 1949

Efficient Image Retrieval Using Sparse Codewords

Pooja V. Baravkar, Gayatri M. Bhandari

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1825 - 1828

Link-Anomaly Detection in Twitter Streams

Shari P S

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1774 - 1780

Real Time Tweet Summarization and Sentiment Analysis of Game Tournament

Vikrant Hole, Mukta Takalikar

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 2037 - 2039

Traffic Detection Using Tweets on Twitter Social Network

Supriya Bhosale, Sucheta Kokate

Share this Article

Similar Articles with Keyword 'security'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1028 - 1031

Secure and Efficient Item Information Retrieval in Cloud Computing

Dr. Shameem Akther, Tahseen Begum

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1486 - 1489

Mobile Based Marketing System Using Privacy and Security Aware Location Based Rewarding System

Digvijay A. Patil, Yogesh B. Gurav

Share this Article
Top