You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output.
Click here to find out more.
Mendeley readers
Chapter title |
Re-Encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-Encryption
|
---|---|
Chapter number | 22 |
Book title |
Topics in Cryptology –- CT-RSA 2015
|
Published in |
Lecture notes in computer science, March 2015
|
DOI | 10.1007/978-3-319-16715-2_22 |
Book ISBNs |
978-3-31-916714-5, 978-3-31-916715-2
|
Authors |
Satsuya Ohata, Yutaka Kawai, Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura |
Editors |
Kaisa Nyberg |
Mendeley readers
The data shown below were compiled from readership statistics for 21 Mendeley readers of this research output. Click here to see the associated Mendeley record.
Geographical breakdown
Country | Count | As % |
---|---|---|
Unknown | 21 | 100% |
Demographic breakdown
Readers by professional status | Count | As % |
---|---|---|
Student > Ph. D. Student | 7 | 33% |
Student > Master | 3 | 14% |
Researcher | 2 | 10% |
Other | 1 | 5% |
Professor | 1 | 5% |
Other | 3 | 14% |
Unknown | 4 | 19% |
Readers by discipline | Count | As % |
---|---|---|
Computer Science | 13 | 62% |
Mathematics | 2 | 10% |
Unspecified | 1 | 5% |
Physics and Astronomy | 1 | 5% |
Unknown | 4 | 19% |