↓ Skip to main content

Theory of Security and Applications

Overview of attention for book
Attention for Chapter 2: Secure Composition of Protocols
Altmetric Badge

Citations

dimensions_citation
2 Dimensions

Readers on

mendeley
4 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Secure Composition of Protocols
Chapter number 2
Book title
Theory of Security and Applications
Published by
Springer, Berlin, Heidelberg, March 2011
DOI 10.1007/978-3-642-27375-9_2
Book ISBNs
978-3-64-227374-2, 978-3-64-227375-9
Authors

Véronique Cortier, Cortier, Véronique

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 4 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 4 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 2 50%
Other 2 50%
Readers by discipline Count As %
Computer Science 4 100%