Next Article in Journal
A Specification-Based IDS for Detecting Attacks on RPL-Based Network Topology
Next Article in Special Issue
Beamforming and Antenna Grouping Design for the Multi-Antenna Relay with Energy Harvesting to Improve Secrecy Rate
Previous Article in Journal
Using Proven Reference Monitor Patterns for Security Evaluation
 
 
Article

Article Versions Notes

Information 2016, 7(2), 24; https://doi.org/10.3390/info7020024
Action Date Notes Link
article pdf uploaded. 12 May 2016 10:23 CEST Version of Record https://www.mdpi.com/2078-2489/7/2/24/pdf-vor
article xml uploaded. 12 May 2016 10:23 CEST Original file -
article html file updated 12 May 2016 10:24 CEST Original file -
article pdf uploaded. 13 May 2016 12:51 CEST Updated version of record https://www.mdpi.com/2078-2489/7/2/24/pdf
article xml uploaded. 13 May 2016 12:51 CEST Update https://www.mdpi.com/2078-2489/7/2/24/xml
article html file updated 16 May 2016 22:49 CEST Update -
article html file updated 24 November 2016 22:46 CET Update -
article html file updated 27 March 2019 04:19 CET Update -
article html file updated 5 May 2019 16:13 CEST Update -
article html file updated 7 February 2020 08:29 CET Update https://www.mdpi.com/2078-2489/7/2/24/html
Back to TopTop