Major Project Report Nitin A1004819081
Major Project Report Nitin A1004819081
Submission Information
Result Information
Similarity 44 %
1 10 20 30 40 50 60 70 80 90
Ref/Bib
Words < 6.84%
14,
Journal/ 13.22%
Publicatio
n 29.83%
Exclude Information
A-Satisfactory (0-10%)
B-Upgrade (11-40%)
44 37 C C-Poor (41-60%)
D-Unacceptable (61-100%)
SIMILARITY % MATCHED SOURCES GRADE
1 www.ijiet.org Publication
17
3 www.doaj.org Publication
3
5 Comparison of online customer ratings between the eco-labelled and non- Publication
1
eco-label by Binbasioglu-2020
8 www.jmir.org Publication
1
9 www.sscnet.ucla.edu Publication
1
10 www.sscnet.ucla.edu Publication
1
11 www.sscnet.ucla.edu Publication
1
18 www.sscnet.ucla.edu Publication
<1
19 www.dx.doi.org Publication
<1
22 Mobile Phone Practices and Policies in Family and Consumer Sciences Publication
<1
Pr by Godfrey-2016
29 erepository.uonbi.ac.ke Publication
<1
31 commons.ln.edu.hk Publication
<1
32 bmcmedgenomics.biomedcentral.com Publication
<1
34 A Review of Social Media and Implications for the Sales Process by Publication
<1
Andzulis-2012
35 A defence scheme against Identity Theft Attack based on multiple socia Publication
<1
by He-2014
7
1) Facebook Messenger: In the United States of2
America, this is the most popular chatting
1 app. The
KRDS, a Paris-based social media and 2mobile
organisation, estimates the number of Facebook
Messenger 1 app users was between 299 and 500
million. Text/video chat, group chat, video and
phone calls, and picture sharing are among the
features.
These qualities might be useful to researchers while
collecting data online.
Username Available
Password Authentication:
Choosing Avatar:
Avatar Confirmation:
Create Group
Create Topic
txt.
Creating a database:
GMS
created_by, created_on
created_by, created_on
Create a table: Users
avatar, created_on
References
[1] T. Frosch, C. Mainka, C. Bader, F. Bergsma, J. Schwenk, and T. Holz, “How secure is
textsecure?” in EuroS&P, 2016.
[2] K. Cohn-Gordon, C. Cremers, B. Dowling, L. Garratt, and D. Stebila, “A formal security
analysis of the Signal messaging protocol,” in EuroS&P, 2017.
[3] N. Kobeissi, K. Bhargavan, and B. Blanchet, “Automated verification for secure messaging
protocols and their implementations: A symbolic and computational approach,” in EuroS&P, 2017.
[4] (2017) Communications market report. [Online]. Available: https://www.ofcom.org.uk/ data/
assets/pdf file/0017/105074/cmr-2017-uk.pdf
[5] eMarketer. (2015, Nov.) Mobile messaging to reach 1.4 billion worldwide in 2015. [Online].
Available: https: //www.emarketer.com/Article/Mobile-MessagingReach-14-Billion-Worldwide-
2015/1013215
[6] Business2Community. (2015, Aug.) Are instant messaging apps the future of the (mobile)
internet? [Online]. Available: http: //www.business2community.com/mobile-
apps/instantmessaging-apps-future-mobile-internet-01313577
[7] C. Garman, M. Green, G. Kaptchuk, I. Miers, and M. Rushanan, “Dancing on the lip of the
volcano: Chosen ciphertext attacks on apple imessage,” in USENIX Security Symposium, 2016.