Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,998,346 papers from all fields of science
Search
Sign In
Create Free Account
Anonymous blog
Known as:
Anonymous blogging
, Anonymous blogs
, Anonymous bloggers
Expand
An anonymous blog is a blog without any acknowledged author or contributor. Anonymous bloggers may achieve anonymity through the simple use of a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
11 relations
Anonymous web browsing
Blog
Digital journalism
Dot-com bubble
Expand
Broader (2)
Crypto-anarchism
Internet privacy
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Optimal Active social Network De-anonymization Using Information Thresholds
Farhad Shirani
,
S. Garg
,
E. Erkip
International Symposium on Information Theory
2018
Corpus ID: 23241063
In this paper, de-anonymizing internet users by actively querying their group memberships in social networks is considered. An…
Expand
2017
2017
Yik Yak and the knowledge community
Sara West
CDQR
2017
Corpus ID: 1094744
Yik Yak is an anonymous, location-based social networking application that is extremely popular on college campuses across the…
Expand
2017
2017
On the applicability of the GRIDNET protocol to Smart Grid environments
Rafał Skowroński
IEEE International Conference on Smart Grid…
2017
Corpus ID: 5030052
The blockchain technology seems to be regarded by many, as a revolution, on the scale comparable to the advent of the Internet…
Expand
Review
2015
Review
2015
Review on Anonymous Routing Protocol forHigh Anonymity Protection in MANETs
N. R. Borkar
,
Avinash P. Wadhe
2015
Corpus ID: 20355922
Mobile Ad-Hoc Network (MANET) uses an anonymous routing protocol for security purpose. This protocol hides nodes original…
Expand
2015
2015
VANET BASED SECURE AND EFFICIENT TRANSPORTATION SYSTEM
K. PoojaR
,
U. Kumar
,
N. Kalyane
2015
Corpus ID: 63190119
This paper presents a recent advance of vehicular technology (VANET) offers many opportunities for developing new navigation…
Expand
Review
2014
Review
2014
Protocolo de Evaluación de la Estabilidad del Tratamiento Ortodóncico
M. Henríquez
2014
Corpus ID: 147171361
Orthodontics treatment involves an effort for the patient and the professional, both expect satisfactory and stable results over…
Expand
2013
2013
Multidimensional k-anonymity for protecting privacy using nearest neighborhood strategy
B. Patil
,
A. Patankar
IEEE International Conference on Computational…
2013
Corpus ID: 14500437
Data mining is the extracting of information or knowledge of the huge amount of data. Privacy preserving data mining is focused…
Expand
Review
2009
Review
2009
Case study on operation of Iranian LIS (library & information science) group weblog during 2006-2008
A. Asnafi
,
Maryam Pakdaman Naeeni
2009
Corpus ID: 60957313
At the present time, a new kind of internet communication has been created amongst librarians, libraries and users which makes…
Expand
2006
2006
Bloggers and the Workplace: The Search for a Legal Solution to the Conflict between Employee Blogging and Employers
Henry Hoang Pham
2006
Corpus ID: 166468456
2004
2004
Virtual focus groups: new technologies, new opportunities, new learning environments
Lyn Turney
,
C. Pocknee
2004
Corpus ID: 61258134
New technologies and ICT provide unique and inventive opportunities for qualitative researchers. Their innate ability to…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE