Next Article in Journal
Kinetic Theory of a Confined Quasi-Two-Dimensional Gas of Hard Spheres
Next Article in Special Issue
User-Centric Key Entropy: Study of Biometric Key Derivation Subject to Spoofing Attacks
Previous Article in Journal
Investigation into Multi-Temporal Scale Complexity of Streamflows and Water Levels in the Poyang Lake Basin, China
Previous Article in Special Issue
Quantum Key Distribution in the Presence of the Intercept-Resend with Faked States Attack
 
 
Article

Article Versions Notes

Entropy 2017, 19(2), 65; https://doi.org/10.3390/e19020065
Action Date Notes Link
article pdf uploaded. 11 February 2017 09:51 CET Version of Record https://www.mdpi.com/1099-4300/19/2/65/pdf
article xml uploaded. 11 February 2017 09:51 CET Original file https://www.mdpi.com/1099-4300/19/2/65/xml
article html file updated 11 February 2017 09:52 CET Original file -
article html file updated 28 February 2017 10:54 CET Update -
article html file updated 4 May 2019 11:38 CEST Update -
article html file updated 23 September 2019 06:52 CEST Update -
article html file updated 7 February 2020 23:11 CET Update -
article html file updated 16 July 2022 04:50 CEST Update https://www.mdpi.com/1099-4300/19/2/65/html
Back to TopTop