Twitsper, Tweeting Privately Over Secure Connections

نویسنده

  • R. Sangeetha
چکیده

OSN today gives some type of privacy controls to protect a user’s shared information from other users, these controls are insufficiently expressive to provides fine protection. We introduce Twitsper to support control over who sees a user messages in Twitter. Twitsper gives privacy controls to the users of Twitter without depending on Twitter to make changes. This is because it is a wrapper in the Twitter that starts or enables private communication while preserving Twitter’s originality.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Communication in Shotgun Cellular Systems

In this paper, we analyze the secure connectivity in Shotgun cellular systems (SCS: Wireless communication systems with randomly placed base stations) by Poisson intrinsically secure communication graph (IS-graph), i.e., a random graph which describes the connections that are secure over a network. For a base-station in SCS, a degree of secure connections is determined over two channel models: ...

متن کامل

Building a Wrapper for Fine-Grained Private Group Messaging on Twitter

User privacy has been an increasingly growing concern in online social networks (OSNs). While most OSNs today provide some form of privacy controls so that their users can protect their shared content from other users, these controls are typically not sufficiently expressive and/or do not provide fine-grained protection of information. In this paper, we consider the introduction of a new privac...

متن کامل

Astrophysicists’ Conversational Connections on Twitter

Because Twitter and other social media are increasingly used for analyses based on altmetrics, this research sought to understand what contexts, affordance use, and social activities influence the tweeting behavior of astrophysicists. Thus, the presented study has been guided by three research questions that consider the influence of astrophysicists' activities (i.e., publishing and tweeting fr...

متن کامل

Secure multiparty computation of a comparison problem

Private comparison is fundamental to secure multiparty computation. In this study, we propose novel protocols to privately determine [Formula: see text], or [Formula: see text] in one execution. First, a 0-1-vector encoding method is introduced to encode a number into a vector, and the Goldwasser-Micali encryption scheme is used to compare integers privately. Then, we propose a protocol by usin...

متن کامل

Persuading Peers in the Web: Social Influence and Tweeters vs. non-Tweeters

The present paper describes an experiment into the effects of sharing vs. receiving roles in a behavior change intervention over a social platform, Twitter. The purpose of the experiment was to explore the possible difference in how participation styles (tweeting vs. non-tweeting) affected the participants’ perceived health behavior. Participants (N=30) in two groups were either to encourage he...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014