You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output.
Click here to find out more.
Mendeley readers
Chapter title |
Making Any Identity-Based Encryption Accountable, Efficiently
|
---|---|
Chapter number | 17 |
Book title |
Computer Security -- ESORICS 2015
|
Published in |
Lecture notes in computer science, January 2016
|
DOI | 10.1007/978-3-319-24174-6_17 |
Book ISBNs |
978-3-31-924173-9, 978-3-31-924174-6
|
Authors |
Kiayias, Aggelos, Tang, Qiang, Aggelos Kiayias, Qiang Tang |
Mendeley readers
The data shown below were compiled from readership statistics for 23 Mendeley readers of this research output. Click here to see the associated Mendeley record.
Geographical breakdown
Country | Count | As % |
---|---|---|
Unknown | 23 | 100% |
Demographic breakdown
Readers by professional status | Count | As % |
---|---|---|
Student > Ph. D. Student | 8 | 35% |
Student > Master | 3 | 13% |
Researcher | 3 | 13% |
Lecturer | 1 | 4% |
Student > Bachelor | 1 | 4% |
Other | 4 | 17% |
Unknown | 3 | 13% |
Readers by discipline | Count | As % |
---|---|---|
Computer Science | 16 | 70% |
Unspecified | 1 | 4% |
Physics and Astronomy | 1 | 4% |
Engineering | 1 | 4% |
Unknown | 4 | 17% |