↓ Skip to main content

Information Theoretic Security

Overview of attention for book
Attention for Chapter 3: Two Protocols for Delegation of Computation
Altmetric Badge

Citations

dimensions_citation
1 Dimensions

Readers on

mendeley
35 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Two Protocols for Delegation of Computation
Chapter number 3
Book title
Information Theoretic Security
Published by
Springer, Berlin, Heidelberg, August 2012
DOI 10.1007/978-3-642-32284-6_3
Book ISBNs
978-3-64-232283-9, 978-3-64-232284-6
Authors

Ran Canetti, Ben Riva, Guy N. Rothblum, Canetti, Ran, Riva, Ben, Rothblum, Guy N.

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 35 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 35 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 11 31%
Researcher 7 20%
Professor > Associate Professor 3 9%
Student > Master 3 9%
Student > Bachelor 2 6%
Other 7 20%
Unknown 2 6%
Readers by discipline Count As %
Computer Science 27 77%
Arts and Humanities 1 3%
Mathematics 1 3%
Physics and Astronomy 1 3%
Medicine and Dentistry 1 3%
Other 1 3%
Unknown 3 9%