Next Article in Journal
Smart Processing for Systems under Uncertainty or Perturbation
Next Article in Special Issue
A Multiple End-Devices Authentication Scheme for LoRaWAN
Previous Article in Journal
Encrypted Malicious Traffic Detection Based on Word2Vec
Previous Article in Special Issue
A Threshold Proxy Re-Encryption Scheme for Secure IoT Data Sharing Based on Blockchain
 
 
Review

Article Versions Notes

Electronics 2022, 11(5), 678; https://doi.org/10.3390/electronics11050678
Action Date Notes Link
article xml file uploaded 23 February 2022 07:51 CET Original file -
article xml uploaded. 23 February 2022 07:51 CET Update https://www.mdpi.com/2079-9292/11/5/678/xml
article pdf uploaded. 23 February 2022 07:51 CET Version of Record https://www.mdpi.com/2079-9292/11/5/678/pdf
article html file updated 23 February 2022 07:53 CET Original file -
article html file updated 1 August 2022 02:10 CEST Update https://www.mdpi.com/2079-9292/11/5/678/html
Back to TopTop