↓ Skip to main content

Theoretical Computer Science

Overview of attention for book
Attention for Chapter 7: How to Leak a Secret: Theory and Applications of Ring Signatures
Altmetric Badge

Citations

dimensions_citation
5 Dimensions

Readers on

mendeley
64 Mendeley
citeulike
1 CiteULike
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
How to Leak a Secret: Theory and Applications of Ring Signatures
Chapter number 7
Book title
Theoretical Computer Science
Published by
Springer, Berlin, Heidelberg, January 2006
DOI 10.1007/11685654_7
Book ISBNs
978-3-54-032880-3, 978-3-54-032881-0
Authors

Ronald L. Rivest, Adi Shamir, Yael Tauman

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 64 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Japan 1 2%
Hong Kong 1 2%
Spain 1 2%
South Africa 1 2%
Unknown 60 94%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 18 28%
Student > Bachelor 6 9%
Researcher 6 9%
Student > Master 6 9%
Student > Postgraduate 5 8%
Other 8 13%
Unknown 15 23%
Readers by discipline Count As %
Computer Science 42 66%
Mathematics 3 5%
Business, Management and Accounting 1 2%
Economics, Econometrics and Finance 1 2%
Physics and Astronomy 1 2%
Other 1 2%
Unknown 15 23%