↓ Skip to main content

Information Security Theory and Practice

Overview of attention for book
Attention for Chapter 5: EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs
Altmetric Badge

Citations

dimensions_citation
3 Dimensions

Readers on

mendeley
15 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs
Chapter number 5
Book title
Information Security Theory and Practice
Published by
Springer, Cham, September 2017
DOI 10.1007/978-3-319-93524-9_5
Book ISBNs
978-3-31-993523-2, 978-3-31-993524-9
Authors

Carlton Shepherd, Raja Naeem Akram, Konstantinos Markantonakis

Timeline

Login to access the full chart related to this output.

If you don’t have an account, click here to discover Explorer

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 15 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 15 100%

Demographic breakdown

Readers by professional status Count As %
Student > Master 4 27%
Unspecified 1 7%
Lecturer 1 7%
Student > Ph. D. Student 1 7%
Professor 1 7%
Other 2 13%
Unknown 5 33%
Readers by discipline Count As %
Computer Science 8 53%
Business, Management and Accounting 1 7%
Unspecified 1 7%
Unknown 5 33%