Next Article in Journal
Medical Image Encryption: A Comprehensive Review
Next Article in Special Issue
Enhancing Data Security: A Cutting-Edge Approach Utilizing Protein Chains in Cryptography and Steganography
Previous Article in Journal
Downlink Power Allocation for CR-NOMA-Based Femtocell D2D Using Greedy Asynchronous Distributed Interference Avoidance Algorithm
Previous Article in Special Issue
Joining Federated Learning to Blockchain for Digital Forensics in IoT
 
 
Article

Article Versions Notes

Computers 2023, 12(8), 159; https://doi.org/10.3390/computers12080159
Action Date Notes Link
article xml file uploaded 9 August 2023 09:36 CEST Original file -
article xml uploaded. 9 August 2023 09:36 CEST Update https://www.mdpi.com/2073-431X/12/8/159/xml
article pdf uploaded. 9 August 2023 09:36 CEST Version of Record https://www.mdpi.com/2073-431X/12/8/159/pdf
article html file updated 9 August 2023 09:37 CEST Original file -
article html file updated 20 August 2023 21:06 CEST Update https://www.mdpi.com/2073-431X/12/8/159/html
Back to TopTop