Next Article in Journal
Automated Classical Cipher Emulation Attacks via Unified Unsupervised Generative Adversarial Networks
Next Article in Special Issue
“Whispers from the Wrist”: Wearable Health Monitoring Devices and Privacy Regulations in the U.S.: The Loopholes, the Challenges, and the Opportunities
Previous Article in Journal / Special Issue
Threshold Lattice-Based Signature Scheme for Authentication by Wearable Devices
 
 
Article

Article Versions Notes

Cryptography 2023, 7(3), 34; https://doi.org/10.3390/cryptography7030034
Action Date Notes Link
article xml file uploaded 7 July 2023 07:43 CEST Original file -
article xml uploaded. 7 July 2023 07:43 CEST Update https://www.mdpi.com/2410-387X/7/3/34/xml
article pdf uploaded. 7 July 2023 07:43 CEST Version of Record https://www.mdpi.com/2410-387X/7/3/34/pdf
article html file updated 7 July 2023 07:44 CEST Original file -
article html file updated 20 July 2023 21:00 CEST Update https://www.mdpi.com/2410-387X/7/3/34/html
Back to TopTop