↓ Skip to main content

Theoretical Computer Science

Overview of attention for book
Attention for Chapter 7: How to Leak a Secret: Theory and Applications of Ring Signatures
Altmetric Badge

Citations

dimensions_citation
3 Dimensions

Readers on

mendeley
51 Mendeley
citeulike
1 CiteULike
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
How to Leak a Secret: Theory and Applications of Ring Signatures
Chapter number 7
Book title
Theoretical Computer Science
Published by
Springer, Berlin, Heidelberg, January 2006
DOI 10.1007/11685654_7
Book ISBNs
978-3-54-032880-3, 978-3-54-032881-0
Authors

Ronald L. Rivest, Adi Shamir, Yael Tauman

Mendeley readers

The data shown below were compiled from readership statistics for 51 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Japan 1 2%
Hong Kong 1 2%
Spain 1 2%
South Africa 1 2%
Unknown 47 92%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 18 35%
Student > Bachelor 6 12%
Student > Master 5 10%
Researcher 5 10%
Student > Postgraduate 4 8%
Other 8 16%
Unknown 5 10%
Readers by discipline Count As %
Computer Science 39 76%
Mathematics 3 6%
Business, Management and Accounting 1 2%
Physics and Astronomy 1 2%
Social Sciences 1 2%
Other 0 0%
Unknown 6 12%