Next Article in Journal
WPAxFuzz: Sniffing Out Vulnerabilities in Wi-Fi Implementations
Previous Article in Journal
Efficient RO-PUF for Generation of Identifiers and Keys in Resource-Constrained Embedded Systems
 
 
Article

Article Versions Notes

Cryptography 2022, 6(4), 52; https://doi.org/10.3390/cryptography6040052
Action Date Notes Link
article pdf uploaded. 17 October 2022 10:08 CEST Version of Record https://www.mdpi.com/2410-387X/6/4/52/pdf-vor
article xml file uploaded 26 October 2022 12:53 CEST Original file -
article xml uploaded. 26 October 2022 12:53 CEST Update https://www.mdpi.com/2410-387X/6/4/52/xml
article pdf uploaded. 26 October 2022 12:53 CEST Updated version of record https://www.mdpi.com/2410-387X/6/4/52/pdf
article html file updated 26 October 2022 12:55 CEST Original file -
article html file updated 28 February 2023 18:25 CET Update -
article html file updated 1 March 2023 22:10 CET Update https://www.mdpi.com/2410-387X/6/4/52/html
Back to TopTop