Next Article in Journal
Super-Activation as a Unique Feature of Secure Communication in Malicious Environments
Next Article in Special Issue
Computer-Aided Identification and Validation of Privacy Requirements
Previous Article in Journal
An Approach to the Match between Experts and Users in a Fuzzy Linguistic Environment
 
 
Article

Article Versions Notes

Information 2016, 7(2), 23; https://doi.org/10.3390/info7020023
Action Date Notes Link
article pdf uploaded. 26 April 2016 09:10 CEST Version of Record https://www.mdpi.com/2078-2489/7/2/23/pdf
article xml uploaded. 26 April 2016 09:10 CEST Original file https://www.mdpi.com/2078-2489/7/2/23/xml
article html file updated 26 April 2016 09:12 CEST Original file -
article html file updated 24 November 2016 22:46 CET Update -
article html file updated 27 March 2019 02:54 CET Update -
article html file updated 5 May 2019 17:38 CEST Update -
article html file updated 7 February 2020 07:45 CET Update https://www.mdpi.com/2078-2489/7/2/23/html
Back to TopTop