You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output.
Click here to find out more.
Timeline
Mendeley readers
Chapter title |
Two Types of Key-Compromise Impersonation Attacks against One-Pass Key Establishment Protocols
|
---|---|
Chapter number | 17 |
Book title |
E-business and Telecommunications
|
Published in |
ADS, July 2007
|
DOI | 10.1007/978-3-540-88653-2_17 |
Book ISBNs |
978-3-54-088652-5, 978-3-54-088653-2
|
Authors |
K. Chalkias, F. Baldimtsi, D. Hristu-Varsakelis, G. Stephanides, Chalkias, K., Baldimtsi, F., Hristu-Varsakelis, D., Stephanides, G. |
Mendeley readers
The data shown below were compiled from readership statistics for 14 Mendeley readers of this research output. Click here to see the associated Mendeley record.
Geographical breakdown
Country | Count | As % |
---|---|---|
Unknown | 14 | 100% |
Demographic breakdown
Readers by professional status | Count | As % |
---|---|---|
Student > Bachelor | 3 | 21% |
Student > Master | 3 | 21% |
Student > Ph. D. Student | 2 | 14% |
Student > Doctoral Student | 1 | 7% |
Other | 1 | 7% |
Other | 0 | 0% |
Unknown | 4 | 29% |
Readers by discipline | Count | As % |
---|---|---|
Computer Science | 5 | 36% |
Engineering | 3 | 21% |
Business, Management and Accounting | 1 | 7% |
Unknown | 5 | 36% |