↓ Skip to main content

Information Theoretic Security

Overview of attention for book
Attention for Chapter 10: Overcoming Weak Expectations via the R $$\acute{e}$$ e ´ nyi Entropy and the Expanded Computational Entropy
Altmetric Badge

Citations

dimensions_citation
1 Dimensions

Readers on

mendeley
17 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Overcoming Weak Expectations via the R $$\acute{e}$$ e ´ nyi Entropy and the Expanded Computational Entropy
Chapter number 10
Book title
Information Theoretic Security
Published by
Springer, Cham, November 2013
DOI 10.1007/978-3-319-04268-8_10
Book ISBNs
978-3-31-904267-1, 978-3-31-904268-8
Authors

Yanqing Yao, Zhoujun Li, Yao, Yanqing, Li, Zhoujun

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 17 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 17 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 7 41%
Student > Master 2 12%
Researcher 2 12%
Professor 1 6%
Other 1 6%
Other 2 12%
Unknown 2 12%
Readers by discipline Count As %
Computer Science 14 82%
Physics and Astronomy 1 6%
Unknown 2 12%