Next Article in Journal
Man-In-The-Middle Attack against Certain Authentication Protocols Revisited: Insights into the Approach and Performances Re-Evaluation
Next Article in Special Issue
Cooperation Promotion from the Perspective of Behavioral Economics: An Incentive Mechanism Based on Loss Aversion in Vehicular Ad-Hoc Networks
Previous Article in Journal
The k-means Algorithm: A Comprehensive Survey and Performance Evaluation
Previous Article in Special Issue
Survey on Power-Aware Optimization Solutions for MANETs
 
 
Article

Article Versions Notes

Electronics 2020, 9(8), 1297; https://doi.org/10.3390/electronics9081297
Action Date Notes Link
article xml file uploaded 12 August 2020 15:37 CEST Original file -
article xml uploaded. 12 August 2020 15:37 CEST Update -
article pdf uploaded. 12 August 2020 15:37 CEST Version of Record https://www.mdpi.com/2079-9292/9/8/1297/pdf-vor
article html file updated 12 August 2020 15:38 CEST Original file -
article xml file uploaded 17 August 2020 03:54 CEST Update -
article xml uploaded. 17 August 2020 03:54 CEST Update https://www.mdpi.com/2079-9292/9/8/1297/xml
article pdf uploaded. 17 August 2020 03:54 CEST Updated version of record https://www.mdpi.com/2079-9292/9/8/1297/pdf
article html file updated 17 August 2020 03:55 CEST Update -
article html file updated 22 July 2022 03:20 CEST Update https://www.mdpi.com/2079-9292/9/8/1297/html
Back to TopTop