Next Article in Journal
Pervasive User Data Collection from Cyberspace: Privacy Concerns and Countermeasures
Next Article in Special Issue
Enhancing Smart Communication Security: A Novel Cost Function for Efficient S-Box Generation in Symmetric Key Cryptography
Previous Article in Journal
Novel and Efficient Privacy-Preserving Continuous Authentication
Previous Article in Special Issue
A Novel and Secure Fake-Modulus Based Rabin-Ӡ Cryptosystem
 
 
Article

Article Versions Notes

Action Date Notes Link
article xml file uploaded 24 January 2024 04:13 CET Original file -
article xml uploaded. 24 January 2024 04:13 CET Update -
article pdf uploaded. 24 January 2024 04:13 CET Version of Record -
article html file updated 24 January 2024 04:14 CET Original file -
article xml file uploaded 24 January 2024 05:13 CET Update -
article xml uploaded. 24 January 2024 05:13 CET Update https://www.mdpi.com/2410-387X/8/1/4/xml
article pdf uploaded. 24 January 2024 05:13 CET Updated version of record https://www.mdpi.com/2410-387X/8/1/4/pdf
article html file updated 24 January 2024 05:15 CET Update https://www.mdpi.com/2410-387X/8/1/4/html
Back to TopTop