Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Anonymous blog

Known as: Anonymous blogging, Anonymous blogs, Anonymous bloggers 
An anonymous blog is a blog without any acknowledged author or contributor. Anonymous bloggers may achieve anonymity through the simple use of a… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
In this paper, de-anonymizing internet users by actively querying their group memberships in social networks is considered. An… Expand
  • figure 1
Is this relevant?
2016
2016
Anonymity online is important to people at times in their lives. Anonymous communication applications such as Whisper and YikYak… Expand
  • figure 1
  • table 1
  • table 2
  • figure 2
Is this relevant?
2015
2015
Some people reconstruct an online identity due to vanity.Some individuals reconstruct an online identity to achieve disinhibition… Expand
Is this relevant?
2012
2012
The current trend in the application space towards systems of loosely coupled and dynamically bound components that enables just… Expand
  • figure 4
  • figure 7
Is this relevant?
2011
2011
Abstract The advent of networked environments into the classroom is changing classroom debates in many ways. This article… Expand
  • figure 1
  • table 1
  • table 2
  • figure 2
  • figure 3
Is this relevant?
2006
2006
The technique of forward/backward simulations has been applied successfully in many distributed and concurrent applications. In… Expand
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Anonymous channels are necessary for a multitude of privacy-protecting protocols. Onion routing is probably the best known way to… Expand
Is this relevant?
Highly Cited
2005
Highly Cited
2005
New information and communication technologies in the form of learning management systems provide unique and inventive… Expand
Is this relevant?
2000
2000
Abstract This study focuses on information high school counselors provide to students during the college choice process… Expand
Is this relevant?
Highly Cited
1997
Highly Cited
1997
Fingerprinting schemes deter people from illegally redistributing digital data by enabling the original merchant of the data to… Expand
Is this relevant?