You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output.
Click here to find out more.
Timeline
Mendeley readers
Chapter title |
V eri C ount : Verifiable Resource Accounting Using Hardware and Software Isolation
|
---|---|
Chapter number | 34 |
Book title |
Applied Cryptography and Network Security
|
Published by |
Springer, Cham, July 2018
|
DOI | 10.1007/978-3-319-93387-0_34 |
Book ISBNs |
978-3-31-993386-3, 978-3-31-993387-0
|
Authors |
Shruti Tople, Soyeon Park, Min Suk Kang, Prateek Saxena, Tople, Shruti, Park, Soyeon, Kang, Min Suk, Saxena, Prateek |
Mendeley readers
The data shown below were compiled from readership statistics for 17 Mendeley readers of this research output. Click here to see the associated Mendeley record.
Geographical breakdown
Country | Count | As % |
---|---|---|
Unknown | 17 | 100% |
Demographic breakdown
Readers by professional status | Count | As % |
---|---|---|
Student > Ph. D. Student | 5 | 29% |
Student > Master | 5 | 29% |
Researcher | 2 | 12% |
Lecturer | 1 | 6% |
Unknown | 4 | 24% |
Readers by discipline | Count | As % |
---|---|---|
Computer Science | 11 | 65% |
Physics and Astronomy | 1 | 6% |
Engineering | 1 | 6% |
Unknown | 4 | 24% |