Next Article in Journal
Weighted Constraint Iterative Algorithm for Phase Hologram Generation
Next Article in Special Issue
Hash-Chain-Based Cross-Regional Safety Authentication for Space-Air-Ground Integrated VANETs
Previous Article in Journal
Design of Railway Track Model with Three-Dimensional Alignment Based on Extended Industry Foundation Classes
Previous Article in Special Issue
Analysis of Vulnerabilities That Can Occur When Generating One-Time Password
 
 
Article

Article Versions Notes

Appl. Sci. 2020, 10(10), 3651; https://doi.org/10.3390/app10103651
Action Date Notes Link
article xml file uploaded 25 May 2020 15:04 CEST Original file -
article pdf uploaded. 25 May 2020 15:04 CEST Version of Record https://www.mdpi.com/2076-3417/10/10/3651/pdf-vor
article xml file uploaded 27 May 2020 08:33 CEST Update -
article xml uploaded. 27 May 2020 08:33 CEST Update -
article pdf uploaded. 27 May 2020 08:33 CEST Updated version of record https://www.mdpi.com/2076-3417/10/10/3651/pdf-vor
article html file updated 27 May 2020 08:35 CEST Original file -
article xml file uploaded 27 May 2020 08:52 CEST Update -
article xml uploaded. 27 May 2020 08:52 CEST Update https://www.mdpi.com/2076-3417/10/10/3651/xml
article pdf uploaded. 27 May 2020 08:52 CEST Updated version of record https://www.mdpi.com/2076-3417/10/10/3651/pdf
article html file updated 27 May 2020 08:54 CEST Update -
article html file updated 6 June 2020 01:29 CEST Update -
article html file updated 21 July 2022 05:56 CEST Update https://www.mdpi.com/2076-3417/10/10/3651/html
Back to TopTop