Next Article in Journal
Blockchain and Self Sovereign Identity to Support Quality in the Food Supply Chain
Next Article in Special Issue
Securing IoT Devices against Differential-Linear (DL) Attack Used on Serpent Algorithm
Previous Article in Journal
A Secure and Efficient Multi-Factor Authentication Algorithm for Mobile Money Applications
Previous Article in Special Issue
ThermalAttackNet: Are CNNs Making It Easy to Perform Temperature Side-Channel Attack in Mobile Edge Devices?
 
 
Article

Article Versions Notes

Future Internet 2021, 13(12), 300; https://doi.org/10.3390/fi13120300
Action Date Notes Link
article pdf uploaded. 25 November 2021 18:19 CET Version of Record https://www.mdpi.com/1999-5903/13/12/300/pdf-vor
article xml file uploaded 26 November 2021 08:08 CET Original file -
article xml uploaded. 26 November 2021 08:08 CET Update https://www.mdpi.com/1999-5903/13/12/300/xml
article pdf uploaded. 26 November 2021 08:08 CET Updated version of record https://www.mdpi.com/1999-5903/13/12/300/pdf
article html file updated 26 November 2021 08:10 CET Original file -
article html file updated 30 July 2022 18:50 CEST Update https://www.mdpi.com/1999-5903/13/12/300/html
Back to TopTop