Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,185,006 papers from all fields of science
Search
Sign In
Create Free Account
Anonymous blog
Known as:
Anonymous blogging
, Anonymous blogs
, Anonymous bloggers
Expand
An anonymous blog is a blog without any acknowledged author or contributor. Anonymous bloggers may achieve anonymity through the simple use of a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
11 relations
Anonymous web browsing
Blog
Digital journalism
Dot-com bubble
Expand
Broader (2)
Crypto-anarchism
Internet privacy
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Optimal Active social Network De-anonymization Using Information Thresholds
Farhad Shirani
,
S. Garg
,
E. Erkip
International Symposium on Information Theory
2018
Corpus ID: 23241063
In this paper, de-anonymizing internet users by actively querying their group memberships in social networks is considered. An…
Expand
2017
2017
On the applicability of the GRIDNET protocol to Smart Grid environments
Rafał Skowroński
IEEE International Conference on Smart Grid…
2017
Corpus ID: 5030052
The blockchain technology seems to be regarded by many, as a revolution, on the scale comparable to the advent of the Internet…
Expand
2017
2017
Yik Yak and the knowledge community
Sara West
CDQR
2017
Corpus ID: 1094744
Yik Yak is an anonymous, location-based social networking application that is extremely popular on college campuses across the…
Expand
2015
2015
Anonymous Split E-Cash—Toward Mobile Anonymous Payments
M. Scheir
,
J. Balasch
,
A. Rial
,
B. Preneel
,
I. Verbauwhede
ACM Transactions on Embedded Computing Systems
2015
Corpus ID: 3823765
Anonymous E-Cash was first introduced in 1982 as a digital, privacy-preserving alternative to physical cash. A lot of research…
Expand
2015
2015
VANET BASED SECURE AND EFFICIENT TRANSPORTATION SYSTEM
K. PoojaR
,
U. Kumar
,
N. Kalyane
2015
Corpus ID: 63190119
This paper presents a recent advance of vehicular technology (VANET) offers many opportunities for developing new navigation…
Expand
2013
2013
Multidimensional k-anonymity for protecting privacy using nearest neighborhood strategy
B. Patil
,
A. Patankar
IEEE International Conference on Computational…
2013
Corpus ID: 14500437
Data mining is the extracting of information or knowledge of the huge amount of data. Privacy preserving data mining is focused…
Expand
2011
2011
Mobilizing the Will to Prosecute: Crimes of Rape at the Yugoslav and Rwandan Tribunals
H. Haddad
2011
Corpus ID: 55172255
Widespread and systematic rape pervaded both the genocides in Bosnia–Herzegovina in 1992 and in Rwanda in 1994. In response to…
Expand
2008
2008
A New Blind Identity-Based Signature Scheme
H. Elkamchouchi
,
Y. Abouelseoud
5th IEEE Consumer Communications and Networking…
2008
Corpus ID: 15228969
Anonymity of consumers is an essential functionality that should be supported in any digital rights management system. Privacy…
Expand
2005
2005
A capability-based privacy-preserving scheme for pervasive computing environments
D. M. Konidala
,
Dang Nguyen Duc
,
Dongman Lee
,
Kwangjo Kim
Third IEEE International Conference on Pervasive…
2005
Corpus ID: 629332
In a pervasive computing environment, users interact with many smart devices or service providers (SPs) to obtain some useful…
Expand
2004
2004
Virtual focus groups: new technologies, new opportunities, new learning environments
Lyn Turney
,
C. Pocknee
2004
Corpus ID: 61258134
New technologies and ICT provide unique and inventive opportunities for qualitative researchers. Their innate ability to…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE