Next Article in Journal
Fair and Secure Multi-Party Computation with Cheater Detection
Next Article in Special Issue
Towards Accurate Run-Time Hardware-Assisted Stealthy Malware Detection: A Lightweight, yet Effective Time Series CNN-Based Approach
Previous Article in Journal
Minimum Round Card-Based Cryptographic Protocols Using Private Operations
Previous Article in Special Issue
Flash-Based Security Primitives: Evolution, Challenges and Future Directions
 
 
Article

Article Versions Notes

Cryptography 2021, 5(3), 18; https://doi.org/10.3390/cryptography5030018
Action Date Notes Link
article pdf uploaded. 27 July 2021 11:30 CEST Version of Record https://www.mdpi.com/2410-387X/5/3/18/pdf-vor
article xml file uploaded 28 July 2021 06:40 CEST Original file -
article xml uploaded. 28 July 2021 06:40 CEST Update https://www.mdpi.com/2410-387X/5/3/18/xml
article pdf uploaded. 28 July 2021 06:40 CEST Updated version of record https://www.mdpi.com/2410-387X/5/3/18/pdf
article html file updated 28 July 2021 06:41 CEST Original file -
article html file updated 27 July 2022 06:42 CEST Update https://www.mdpi.com/2410-387X/5/3/18/html
Back to TopTop