Next Article in Journal
Ephemeral-Secret-Leakage Secure ID-Based Three-Party Authenticated Key Agreement Protocol for Mobile Distributed Computing Environments
Next Article in Special Issue
Applying Genetic Programming with Similar Bug Fix Information to Automatic Fault Repair
Previous Article in Journal
The Landau-Lifshitz Equation, the NLS, and the Magnetic Rogue Wave as a By-Product of Two Colliding Regular “Positons”
Previous Article in Special Issue
A Robust Image Watermarking Technique Based on DWT, APDCBT, and SVD
 
 
Article

Article Versions Notes

Symmetry 2018, 10(4), 83; https://doi.org/10.3390/sym10040083
Action Date Notes Link
article pdf uploaded. 28 March 2018 17:44 CEST Version of Record https://www.mdpi.com/2073-8994/10/4/83/pdf
article xml uploaded. 28 March 2018 17:44 CEST Original file -
article xml uploaded. 28 March 2018 17:44 CEST Update -
article xml uploaded. 28 March 2018 17:44 CEST Update https://www.mdpi.com/2073-8994/10/4/83/xml
article html file updated 28 March 2018 17:45 CEST Original file -
article html file updated 1 May 2018 05:30 CEST Update -
article html file updated 29 March 2019 10:42 CET Update -
article html file updated 17 April 2019 07:50 CEST Update -
article html file updated 1 May 2019 07:52 CEST Update -
article html file updated 2 October 2019 01:39 CEST Update -
article html file updated 9 February 2020 11:39 CET Update https://www.mdpi.com/2073-8994/10/4/83/html
Back to TopTop