You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output.
Click here to find out more.
Mendeley readers
Chapter title |
How to Leak a Secret: Theory and Applications of Ring Signatures
|
---|---|
Chapter number | 7 |
Book title |
Theoretical Computer Science
|
Published by |
Springer, Berlin, Heidelberg, January 2006
|
DOI | 10.1007/11685654_7 |
Book ISBNs |
978-3-54-032880-3, 978-3-54-032881-0
|
Authors |
Ronald L. Rivest, Adi Shamir, Yael Tauman |
Mendeley readers
The data shown below were compiled from readership statistics for 64 Mendeley readers of this research output. Click here to see the associated Mendeley record.
Geographical breakdown
Country | Count | As % |
---|---|---|
Japan | 1 | 2% |
Hong Kong | 1 | 2% |
Spain | 1 | 2% |
South Africa | 1 | 2% |
Unknown | 60 | 94% |
Demographic breakdown
Readers by professional status | Count | As % |
---|---|---|
Student > Ph. D. Student | 18 | 28% |
Student > Bachelor | 6 | 9% |
Researcher | 6 | 9% |
Student > Master | 6 | 9% |
Student > Postgraduate | 5 | 8% |
Other | 8 | 13% |
Unknown | 15 | 23% |
Readers by discipline | Count | As % |
---|---|---|
Computer Science | 42 | 66% |
Mathematics | 3 | 5% |
Business, Management and Accounting | 1 | 2% |
Economics, Econometrics and Finance | 1 | 2% |
Physics and Astronomy | 1 | 2% |
Other | 1 | 2% |
Unknown | 15 | 23% |