↓ Skip to main content

Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems

Overview of attention for book
Attention for Chapter 2: Malleable Signatures for Resource Constrained Platforms
Altmetric Badge

Citations

dimensions_citation
1 Dimensions

Readers on

mendeley
4 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Malleable Signatures for Resource Constrained Platforms
Chapter number 2
Book title
Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems
Published by
Springer, Berlin, Heidelberg, May 2013
DOI 10.1007/978-3-642-38530-8_2
Book ISBNs
978-3-64-238529-2, 978-3-64-238530-8
Authors

Henrich C. Pöhls, Stefan Peters, Kai Samelin, Joachim Posegga, Hermann de Meer, Pöhls, Henrich C., Peters, Stefan, Samelin, Kai, Posegga, Joachim, de Meer, Hermann

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 4 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 4 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 2 50%
Researcher 1 25%
Other 1 25%
Readers by discipline Count As %
Computer Science 4 100%