Next Article in Journal
On General Data Protection Regulation Vulnerabilities and Privacy Issues, for Wearable Devices and Fitness Tracking Applications
Previous Article in Journal
Parallel Privacy-Preserving Shortest Path Algorithms
Previous Article in Special Issue
A Delay-Based Machine Learning Model for DMA Attack Mitigation
 
 
Article

Article Versions Notes

Cryptography 2021, 5(4), 28; https://doi.org/10.3390/cryptography5040028
Action Date Notes Link
article pdf uploaded. 17 October 2021 14:03 CEST Version of Record https://www.mdpi.com/2410-387X/5/4/28/pdf-vor
article pdf uploaded. 20 October 2021 03:31 CEST Updated version of record https://www.mdpi.com/2410-387X/5/4/28/pdf-vor
article pdf uploaded. 20 October 2021 03:46 CEST Updated version of record https://www.mdpi.com/2410-387X/5/4/28/pdf-vor
article xml file uploaded 21 October 2021 06:15 CEST Original file -
article xml uploaded. 21 October 2021 06:15 CEST Update https://www.mdpi.com/2410-387X/5/4/28/xml
article pdf uploaded. 21 October 2021 06:15 CEST Updated version of record https://www.mdpi.com/2410-387X/5/4/28/pdf
article html file updated 21 October 2021 06:17 CEST Original file -
article html file updated 21 October 2021 10:15 CEST Update -
article html file updated 30 July 2022 11:25 CEST Update https://www.mdpi.com/2410-387X/5/4/28/html
Back to TopTop