You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output.
Click here to find out more.
Timeline
Mendeley readers
Chapter title |
Identity-Based Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud Applications and Sensor Networks
|
---|---|
Chapter number | 8 |
Book title |
Computer Security - ESORICS 2014
|
Published by |
Springer International Publishing, January 2014
|
DOI | 10.1007/978-3-319-11203-9_8 |
Book ISBNs |
978-3-31-911202-2, 978-3-31-911203-9
|
Authors |
Tsz Hon Yuen, Ye Zhang, Siu Ming Yiu, Joseph K. Liu |
Editors |
Mirosław Kutyłowski, Jaideep Vaidya |
Mendeley readers
The data shown below were compiled from readership statistics for 29 Mendeley readers of this research output. Click here to see the associated Mendeley record.
Geographical breakdown
Country | Count | As % |
---|---|---|
Unknown | 29 | 100% |
Demographic breakdown
Readers by professional status | Count | As % |
---|---|---|
Student > Ph. D. Student | 10 | 34% |
Other | 4 | 14% |
Researcher | 3 | 10% |
Student > Master | 2 | 7% |
Professor | 1 | 3% |
Other | 3 | 10% |
Unknown | 6 | 21% |
Readers by discipline | Count | As % |
---|---|---|
Computer Science | 21 | 72% |
Physics and Astronomy | 1 | 3% |
Engineering | 1 | 3% |
Unknown | 6 | 21% |