Research Paper | Computer Science & Engineering | India | Volume 3 Issue 5, May 2014
Twitsper; Tweeting Privately Over Secure Connections
OSN today gives some type of privacy controls to protect a users shared information from other users; these controls are insufficiently expressive to provides fine protection. We introduce Twitsper to support control over who sees a user messages in Twitter. Twitsper gives privacy controls to the users of Twitter without depending on Twitter to make changes. This is because it is a wrapper in the Twitter that starts or enables private communication while preserving Twitters originality.
Keywords: witter, video calling, security, Data transmission packet, Private twitting
Edition: Volume 3 Issue 5, May 2014
Pages: 1369 - 1371
How to Cite this Article?
R. Sangeetha, "Twitsper; Tweeting Privately Over Secure Connections", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=20132096, Volume 3 Issue 5, May 2014, 1369 - 1371
80 PDF Views | 66 PDF Downloads
Similar Articles with Keyword 'witter'
Spammer Detection and Identification on Social Network Using Machine Learning
Dr. Shameem Akhter, Noorain Saba
Novel Class Detection for Feature Evolving Data Streams
Harshada Wagaskar, Prof. Gayatri Bhandari
A Novel Approach for Interpreting Public Sentiment Variations on Twitter: A Review
Pankaj Bhalerao, Trupti Dange
Link-Anomaly Detection in Twitter Streams
Shari P S
Live Data Stream Classification for Reducing Query Processing Time: Design and Analysis
Spraha Kamriya, Vandana Kate
Similar Articles with Keyword 'security'
Survey: Detection Schemes Against Selective Forwarding Attack
Harpal Singh, Vaibhav Pandey
A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme
Rajshree Ambatkar, Purnima Selokar
Optimizing the Ad-Hoc Applications in Vehicular Network: A Study
Sumeet Sekhon, Dinesh Kumar
Recent Developments on Probabilistic Graphical Model Applied in Data Analysis
Kan'Sam Nadjak, Guisheng Yin
An Analysis of Mobile Applications Security; Issue and Aspects from the User's Perspective
Ashish A Kulkarni, Dr. Shivaji R. Madan