Next Article in Journal
Robust Secure Authentication and Data Storage with Perfect Secrecy
Previous Article in Journal
Can Ternary Computing Improve Information Assurance?
Previous Article in Special Issue
FPGA Implementation of a Cryptographically-Secure PUF Based on Learning Parity with Noise
 
 
Article

Article Versions Notes

Action Date Notes Link
article pdf uploaded. 28 March 2018 15:40 CEST Version of Record https://www.mdpi.com/2410-387X/2/2/7/pdf-vor
article xml uploaded. 28 March 2018 15:40 CEST Original file -
article xml uploaded. 28 March 2018 15:40 CEST Update -
article html file updated 28 March 2018 15:41 CEST Original file -
article pdf uploaded. 9 April 2018 09:07 CEST Updated version of record https://www.mdpi.com/2410-387X/2/2/7/pdf-vor
article xml uploaded. 9 April 2018 09:07 CEST Update -
article xml uploaded. 9 April 2018 09:07 CEST Update -
article html file updated 9 April 2018 09:09 CEST Update -
article pdf uploaded. 10 April 2018 13:38 CEST Updated version of record https://www.mdpi.com/2410-387X/2/2/7/pdf
article xml uploaded. 10 April 2018 13:38 CEST Update https://www.mdpi.com/2410-387X/2/2/7/xml
article html file updated 10 April 2018 13:39 CEST Update -
article html file updated 29 March 2019 10:39 CET Update -
article html file updated 17 April 2019 07:53 CEST Update -
article html file updated 1 May 2019 07:55 CEST Update -
article html file updated 2 October 2019 01:31 CEST Update -
article html file updated 9 February 2020 11:37 CET Update -
article html file updated 16 July 2022 10:18 CEST Update https://www.mdpi.com/2410-387X/2/2/7/html
Back to TopTop