You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Protecting Against Key Escrow and Key Exposure in Identity-Based Cryptosystem
Theory and Applications of Models of Computation
Springer, Berlin, Heidelberg, May 2007
Jin Wang, Xi Bai, Jia Yu, Daxing Li
The data shown below were compiled from readership statistics for 2 Mendeley readers of this research output. Click here to see the associated Mendeley record.
|Readers by professional status||Count||As %|
|Readers by discipline||Count||As %|