↓ Skip to main content

Information Security Theory and Practice. Securing the Internet of Things

Overview of attention for book
Attention for Chapter 2: A Security Analysis of Key Expansion Functions Using Pseudorandom Permutations
Altmetric Badge

Citations

dimensions_citation
2 Dimensions

Readers on

mendeley
4 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
A Security Analysis of Key Expansion Functions Using Pseudorandom Permutations
Chapter number 2
Book title
Information Security Theory and Practice. Securing the Internet of Things
Published by
Springer, Berlin, Heidelberg, June 2014
DOI 10.1007/978-3-662-43826-8_2
Book ISBNs
978-3-66-243825-1, 978-3-66-243826-8
Authors

Ju-Sung Kang, Nayoung Kim, Wangho Ju, Ok-Yeon Yi

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 4 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 4 100%

Demographic breakdown

Readers by professional status Count As %
Professor 1 25%
Student > Ph. D. Student 1 25%
Researcher 1 25%
Other 1 25%
Readers by discipline Count As %
Computer Science 3 75%
Mathematics 1 25%