Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,238,398 papers from all fields of science
Search
Sign In
Create Free Account
Anonymous blog
Known as:
Anonymous blogging
, Anonymous blogs
, Anonymous bloggers
Expand
An anonymous blog is a blog without any acknowledged author or contributor. Anonymous bloggers may achieve anonymity through the simple use of a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
11 relations
Anonymous web browsing
Blog
Digital journalism
Dot-com bubble
Expand
Broader (2)
Crypto-anarchism
Internet privacy
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Optimal Active social Network De-anonymization Using Information Thresholds
Farhad Shirani
,
S. Garg
,
E. Erkip
International Symposium on Information Theory
2018
Corpus ID: 23241063
In this paper, de-anonymizing internet users by actively querying their group memberships in social networks is considered. An…
Expand
2017
2017
A certificateless approach to onion routing
D. Catalano
,
D. Fiore
,
R. Gennaro
International Journal of Information Security
2017
Corpus ID: 40367264
Onion routing protocols allow users to establish anonymous channels to preserve their privacy over a public network. Several…
Expand
Highly Cited
2016
Highly Cited
2016
Strangers on Your Phone: Why People Use Anonymous Communication Applications
Ruogu Kang
,
Laura A. Dabbish
,
Katherine Sutton
Conference on Computer Supported Cooperative Work
2016
Corpus ID: 9818386
Anonymity online is important to people at times in their lives. Anonymous communication applications such as Whisper and YikYak…
Expand
2015
2015
Achieving self-congruency? Examining why individuals reconstruct their virtual identity in communities of interest established within social network platforms
Chuan Hu
,
Li Zhao
,
Jiao Huang
Computers in Human Behavior
2015
Corpus ID: 24753566
2012
2012
Privacy-Preserving Updates to Anonymous and Confidential Database
K. P. Thooyamani
,
V. Khanaa
,
M. Venkatesh
2012
Corpus ID: 63878606
The current trend in the application space towards systems of loosely coupled and dynamically bound components that enables just…
Expand
2011
2011
Anonymity in classroom voting and debating
S. Ainsworth
,
Giulia Gelmini-Hornsby
,
Kate Threapleton
,
C. Crook
,
C. O'Malley
,
Marie Buda
2011
Corpus ID: 14101831
Highly Cited
2010
Highly Cited
2010
The impact of anonymity on weblog credibility
T. Chesney
,
Daniel K. S. Su
Int. J. Hum. Comput. Stud.
2010
Corpus ID: 22235116
2002
2002
Unconditionally Secure Anonymous Encryption and Group Authentication
Goichiro Hanaoka
,
Junji Shikata
,
Y. Hanaoka
,
H. Imai
Computer/law journal
2002
Corpus ID: 1153809
Anonymous channels or similar techniques that can achieve sender's anonymity play important roles in many applications. However…
Expand
Review
1999
Review
1999
Employee involvement, pollution control and pieces to the puzzle
D. Keith Denton
1999
Corpus ID: 50860258
Employee involvement is essential to improving pollution control. Organizations like Dow Chemical have been able to use employee…
Expand
Highly Cited
1997
Highly Cited
1997
Anonymous Fingerprinting
B. Pfitzmann
,
M. Waidner
International Conference on the Theory and…
1997
Corpus ID: 156998
Fingerprinting schemes deter people from illegally redistributing digital data by enabling the original merchant of the data to…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE