You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output.
Click here to find out more.
Mendeley readers
Chapter title |
On Optimizing the Security-Throughput Trade-Off in Wireless Networks with Adversaries
|
---|---|
Chapter number | 31 |
Book title |
Applied Cryptography and Network Security
|
Published by |
Springer, Berlin, Heidelberg, June 2006
|
DOI | 10.1007/11767480_31 |
Book ISBNs |
978-3-54-034703-3, 978-3-54-034704-0
|
Authors |
Mohamed A. Haleem, Chetan Nanjunda Mathur, R. Chandramouli, K. P. Subbalakshmi, Haleem, Mohamed A., Mathur, Chetan Nanjunda, Chandramouli, R., Subbalakshmi, K. P. |
Mendeley readers
The data shown below were compiled from readership statistics for 26 Mendeley readers of this research output. Click here to see the associated Mendeley record.
Geographical breakdown
Country | Count | As % |
---|---|---|
Unknown | 26 | 100% |
Demographic breakdown
Readers by professional status | Count | As % |
---|---|---|
Student > Ph. D. Student | 8 | 31% |
Student > Master | 5 | 19% |
Researcher | 3 | 12% |
Professor | 3 | 12% |
Lecturer | 1 | 4% |
Other | 3 | 12% |
Unknown | 3 | 12% |
Readers by discipline | Count | As % |
---|---|---|
Computer Science | 20 | 77% |
Engineering | 2 | 8% |
Physics and Astronomy | 1 | 4% |
Unknown | 3 | 12% |