↓ Skip to main content

Theory of Security and Applications

Overview of attention for book
Attention for Chapter 8: Security Goals and Protocol Transformations
Altmetric Badge

Readers on

mendeley
4 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Security Goals and Protocol Transformations
Chapter number 8
Book title
Theory of Security and Applications
Published by
Springer, Berlin, Heidelberg, March 2011
DOI 10.1007/978-3-642-27375-9_8
Book ISBNs
978-3-64-227374-2, 978-3-64-227375-9
Authors

Joshua D. Guttman

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 4 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 4 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 2 50%
Professor 1 25%
Other 1 25%
Readers by discipline Count As %
Computer Science 4 100%