Next Article in Journal
Pairing Free Identity-Based Blind Signature Scheme with Message Recovery
Previous Article in Journal
Improving Performance and Mitigating Fault Attacks Using Value Prediction
Previous Article in Special Issue
A New Visual Multi-Secrets Sharing Scheme by Random Grids
 
 
Article

Article Versions Notes

Cryptography 2018, 2(4), 28; https://doi.org/10.3390/cryptography2040028
Action Date Notes Link
article xml file uploaded 27 September 2018 15:24 CEST Original file -
article xml uploaded. 27 September 2018 15:24 CEST Update -
article pdf uploaded. 27 September 2018 15:24 CEST Version of Record https://www.mdpi.com/2410-387X/2/4/28/pdf-vor
article html file updated 27 September 2018 15:26 CEST Original file -
article xml file uploaded 28 September 2018 14:59 CEST Update -
article xml uploaded. 28 September 2018 14:59 CEST Update -
article pdf uploaded. 28 September 2018 14:59 CEST Updated version of record https://www.mdpi.com/2410-387X/2/4/28/pdf-vor
article html file updated 28 September 2018 15:00 CEST Update -
article xml file uploaded 29 September 2018 04:07 CEST Update -
article xml uploaded. 29 September 2018 04:07 CEST Update https://www.mdpi.com/2410-387X/2/4/28/xml
article pdf uploaded. 29 September 2018 04:07 CEST Updated version of record https://www.mdpi.com/2410-387X/2/4/28/pdf
article html file updated 29 September 2018 04:08 CEST Update -
article html file updated 31 March 2019 23:33 CEST Update -
article html file updated 14 April 2019 20:49 CEST Update -
article html file updated 29 April 2019 01:28 CEST Update -
article html file updated 8 October 2019 09:51 CEST Update -
article html file updated 10 February 2020 13:08 CET Update https://www.mdpi.com/2410-387X/2/4/28/html
Back to TopTop