You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output.
Click here to find out more.
Timeline
Mendeley readers
Chapter title |
Protecting Deductive Databases from Unauthorized Retrievals
|
---|---|
Chapter number | 17 |
Book title |
Data and Application Security
|
Published by |
Springer, Boston, MA, January 2002
|
DOI | 10.1007/0-306-47008-x_17 |
Book ISBNs |
978-0-7923-7514-2, 978-0-306-47008-0
|
Authors |
Steve Barker, Barker, Steve |
Mendeley readers
The data shown below were compiled from readership statistics for 2 Mendeley readers of this research output. Click here to see the associated Mendeley record.
Geographical breakdown
Country | Count | As % |
---|---|---|
Unknown | 2 | 100% |
Demographic breakdown
Readers by professional status | Count | As % |
---|---|---|
Student > Ph. D. Student | 1 | 50% |
Other | 1 | 50% |
Readers by discipline | Count | As % |
---|---|---|
Computer Science | 2 | 100% |