Next Article in Journal
Chaotic Map with No Fixed Points: Entropy, Implementation and Control
Next Article in Special Issue
Physical Layer Key Generation in 5G and Beyond Wireless Communications: Challenges and Opportunities
Previous Article in Journal
Bipartite Structures in Social Networks: Traditional versus Entropy-Driven Analyses
Previous Article in Special Issue
Attack Algorithm for a Keystore-Based Secret Key Generation Method
 
 
Article

Article Versions Notes

Entropy 2019, 21(3), 278; https://doi.org/10.3390/e21030278
Action Date Notes Link
article xml file uploaded 13 March 2019 15:04 CET Original file -
article pdf uploaded. 13 March 2019 15:04 CET Version of Record https://www.mdpi.com/1099-4300/21/3/278/pdf-vor
article xml file uploaded 14 March 2019 04:48 CET Update -
article xml uploaded. 14 March 2019 04:48 CET Update https://www.mdpi.com/1099-4300/21/3/278/xml
article pdf uploaded. 14 March 2019 04:48 CET Updated version of record https://www.mdpi.com/1099-4300/21/3/278/pdf
article html file updated 14 March 2019 04:49 CET Original file -
article html file updated 2 April 2019 10:23 CEST Update -
article html file updated 4 April 2019 12:49 CEST Update -
article html file updated 11 April 2019 22:40 CEST Update -
article html file updated 26 April 2019 03:37 CEST Update -
article html file updated 16 October 2019 13:32 CEST Update -
article html file updated 11 February 2020 22:02 CET Update https://www.mdpi.com/1099-4300/21/3/278/html
Back to TopTop