Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,257,668 papers from all fields of science
Search
Sign In
Create Free Account
Anonymous blog
Known as:
Anonymous blogging
, Anonymous blogs
, Anonymous bloggers
Expand
An anonymous blog is a blog without any acknowledged author or contributor. Anonymous bloggers may achieve anonymity through the simple use of a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
11 relations
Anonymous web browsing
Blog
Digital journalism
Dot-com bubble
Expand
Broader (2)
Crypto-anarchism
Internet privacy
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Optimal Active social Network De-anonymization Using Information Thresholds
Farhad Shirani
,
S. Garg
,
E. Erkip
International Symposium on Information Theory
2018
Corpus ID: 23241063
In this paper, de-anonymizing internet users by actively querying their group memberships in social networks is considered. An…
Expand
2017
2017
On the applicability of the GRIDNET protocol to Smart Grid environments
Rafał Skowroński
IEEE International Conference on Smart Grid…
2017
Corpus ID: 5030052
The blockchain technology seems to be regarded by many, as a revolution, on the scale comparable to the advent of the Internet…
Expand
2017
2017
Yik Yak and the knowledge community
Sara West
CDQR
2017
Corpus ID: 1094744
Yik Yak is an anonymous, location-based social networking application that is extremely popular on college campuses across the…
Expand
2015
2015
VANET BASED SECURE AND EFFICIENT TRANSPORTATION SYSTEM
K. PoojaR
,
U. Kumar
,
N. Kalyane
2015
Corpus ID: 63190119
This paper presents a recent advance of vehicular technology (VANET) offers many opportunities for developing new navigation…
Expand
Review
2015
Review
2015
Review on Anonymous Routing Protocol forHigh Anonymity Protection in MANETs
N. R. Borkar
,
Avinash P. Wadhe
2015
Corpus ID: 20355922
Mobile Ad-Hoc Network (MANET) uses an anonymous routing protocol for security purpose. This protocol hides nodes original…
Expand
2013
2013
Multidimensional k-anonymity for protecting privacy using nearest neighborhood strategy
B. Patil
,
A. Patankar
IEEE International Conference on Computational…
2013
Corpus ID: 14500437
Data mining is the extracting of information or knowledge of the huge amount of data. Privacy preserving data mining is focused…
Expand
2007
2007
SECURITY SERVICES IN E-SCHOOL AND THEIR ROLE IN THE EVALUATION OF EDUCATIONAL PROCESSES
D. Zissis
,
D. Lekkas
,
T. Spyrou
2007
Corpus ID: 65549
This paper presents the e-School initiative which is involved in the integration of daily business processes conducted by primary…
Expand
2006
2006
Bloggers and the Workplace: The Search for a Legal Solution to the Conflict between Employee Blogging and Employers
Henry Hoang Pham
2006
Corpus ID: 166468456
2005
2005
A capability-based privacy-preserving scheme for pervasive computing environments
D. M. Konidala
,
Dang Nguyen Duc
,
Dongman Lee
,
Kwangjo Kim
Third IEEE International Conference on Pervasive…
2005
Corpus ID: 629332
In a pervasive computing environment, users interact with many smart devices or service providers (SPs) to obtain some useful…
Expand
2004
2004
Virtual focus groups: new technologies, new opportunities, new learning environments
Lyn Turney
,
C. Pocknee
2004
Corpus ID: 61258134
New technologies and ICT provide unique and inventive opportunities for qualitative researchers. Their innate ability to…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE