Next Article in Journal
A Small Subgroup Attack on Bitcoin Address Generation
Next Article in Special Issue
Privacy Preservation in Edge Consumer Electronics by Combining Anomaly Detection with Dynamic Attribute-Based Re-Encryption
Previous Article in Journal
Schauder-Type Fixed Point Theorem in Generalized Fuzzy Normed Linear Spaces
Previous Article in Special Issue
On the Optimal Control of a Malware Propagation Model
 
 
Article

Article Versions Notes

Mathematics 2020, 8(10), 1644; https://doi.org/10.3390/math8101644
Action Date Notes Link
article pdf uploaded. 23 September 2020 14:35 CEST Version of Record https://www.mdpi.com/2227-7390/8/10/1644/pdf-vor
article xml file uploaded 27 September 2020 18:11 CEST Original file -
article xml uploaded. 27 September 2020 18:11 CEST Update -
article pdf uploaded. 27 September 2020 18:11 CEST Updated version of record https://www.mdpi.com/2227-7390/8/10/1644/pdf-vor
article html file updated 27 September 2020 18:13 CEST Original file -
article xml file uploaded 30 September 2020 16:48 CEST Update -
article xml uploaded. 30 September 2020 16:48 CEST Update https://www.mdpi.com/2227-7390/8/10/1644/xml
article pdf uploaded. 30 September 2020 16:48 CEST Updated version of record https://www.mdpi.com/2227-7390/8/10/1644/pdf
article html file updated 30 September 2020 16:49 CEST Update -
article html file updated 22 July 2022 08:20 CEST Update https://www.mdpi.com/2227-7390/8/10/1644/html
Back to TopTop