Next Article in Journal / Special Issue
On the Design and Analysis of a Biometric Authentication System Using Keystroke Dynamics
Previous Article in Journal
On Quantum Chosen-Ciphertext Attacks and Learning with Errors
Previous Article in Special Issue
A Robust, Low-Cost and Secure Authentication Scheme for IoT Applications
 
 
Article

Article Versions Notes

Cryptography 2020, 4(2), 11; https://doi.org/10.3390/cryptography4020011
Action Date Notes Link
article xml file uploaded 4 April 2020 17:28 CEST Original file -
article pdf uploaded. 4 April 2020 17:28 CEST Version of Record https://www.mdpi.com/2410-387X/4/2/11/pdf-vor
article xml file uploaded 9 April 2020 10:47 CEST Update -
article xml uploaded. 9 April 2020 10:47 CEST Update https://www.mdpi.com/2410-387X/4/2/11/xml
article pdf uploaded. 9 April 2020 10:47 CEST Updated version of record https://www.mdpi.com/2410-387X/4/2/11/pdf
article html file updated 9 April 2020 10:49 CEST Original file -
article html file updated 8 October 2020 20:30 CEST Update -
article html file updated 21 July 2022 01:01 CEST Update https://www.mdpi.com/2410-387X/4/2/11/html
Back to TopTop