Next Article in Journal
Efficient RO-PUF for Generation of Identifiers and Keys in Resource-Constrained Embedded Systems
Previous Article in Journal
Blockchain of Resource-Efficient Anonymity Protection with Watermarking for IoT Big Data Market
 
 
Article

Article Versions Notes

Cryptography 2022, 6(4), 50; https://doi.org/10.3390/cryptography6040050
Action Date Notes Link
article pdf uploaded. 1 October 2022 14:14 CEST Version of Record https://www.mdpi.com/2410-387X/6/4/50/pdf-vor
article xml file uploaded 21 October 2022 08:02 CEST Original file -
article xml uploaded. 21 October 2022 08:02 CEST Update https://www.mdpi.com/2410-387X/6/4/50/xml
article pdf uploaded. 21 October 2022 08:02 CEST Updated version of record https://www.mdpi.com/2410-387X/6/4/50/pdf
article html file updated 21 October 2022 08:03 CEST Original file -
article html file updated 28 February 2023 16:21 CET Update -
article html file updated 1 March 2023 14:34 CET Update https://www.mdpi.com/2410-387X/6/4/50/html
Back to TopTop