Next Article in Journal
Super-Activation as a Unique Feature of Secure Communication in Malicious Environments
Next Article in Special Issue
Computer-Aided Identification and Validation of Privacy Requirements
Previous Article in Journal
An Approach to the Match between Experts and Users in a Fuzzy Linguistic Environment
Article Menu

Export Article

Information 2016, 7(2), 23; doi:10.3390/info7020023
Open AccessArticle

Notes on Article Versions

Action Date Notes Link
article pdf uploaded. 26 April 2016 09:10 CEST Version of Record http://www.mdpi.com/2078-2489/7/2/23/pdf
article xml uploaded. 26 April 2016 09:10 CEST Original file http://www.mdpi.com/2078-2489/7/2/23/xml
article html file updated 26 April 2016 09:12 CEST Original file -
article html file updated 24 November 2016 22:46 CET Update http://www.mdpi.com/2078-2489/7/2/23/html
Information EISSN 2078-2489 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top