Next Article in Journal
An Improved Two-Way Security Authentication Protocol for RFID System
Previous Article in Journal
Hybrid Destination-Based Jamming and Opportunistic Scheduling with Optimal Power Allocation to Secure Multiuser Untrusted Relay Networks
 
 
Article

Article Versions Notes

Information 2018, 9(4), 85; https://doi.org/10.3390/info9040085
Action Date Notes Link
article pdf uploaded. 9 April 2018 12:47 CEST Version of Record https://www.mdpi.com/2078-2489/9/4/85/pdf
article xml uploaded. 9 April 2018 12:47 CEST Original file https://www.mdpi.com/2078-2489/9/4/85/xml
article html file updated 9 April 2018 12:48 CEST Original file -
article html file updated 1 May 2018 04:39 CEST Update -
article html file updated 29 March 2019 13:57 CET Update -
article html file updated 17 April 2019 05:12 CEST Update -
article html file updated 1 May 2019 04:58 CEST Update -
article html file updated 2 October 2019 10:15 CEST Update -
article html file updated 9 February 2020 13:04 CET Update https://www.mdpi.com/2078-2489/9/4/85/html
Back to TopTop