Next Article in Journal
Redundancy in Key Management for WSNs
Previous Article in Journal
Trusted Time-Based Verification Model for Automatic Man-in-the-Middle Attack Detection in Cybersecurity
Previous Article in Special Issue
Efficient One-Time Signatures from Quasi-Cyclic Codes: A Full Treatment
 
 
Article

Article Versions Notes

Cryptography 2018, 2(4), 39; https://doi.org/10.3390/cryptography2040039
Action Date Notes Link
article xml file uploaded 6 December 2018 11:24 CET Original file -
article xml uploaded. 6 December 2018 11:24 CET Update https://www.mdpi.com/2410-387X/2/4/39/xml
article pdf uploaded. 6 December 2018 11:24 CET Version of Record https://www.mdpi.com/2410-387X/2/4/39/pdf
article html file updated 6 December 2018 11:25 CET Original file -
article html file updated 2 April 2019 08:49 CEST Update -
article html file updated 13 April 2019 18:47 CEST Update -
article html file updated 27 April 2019 22:55 CEST Update -
article html file updated 11 October 2019 13:39 CEST Update -
article html file updated 11 February 2020 01:36 CET Update -
article html file updated 17 July 2022 13:42 CEST Update https://www.mdpi.com/2410-387X/2/4/39/html
Back to TopTop