Next Article in Journal
Multi-Factor Authentication: A Survey
Previous Article in Journal
Anomalous Traffic Detection and Self-Similarity Analysis in the Environment of ATMSim
 
 
Article

Article Versions Notes

Cryptography 2017, 1(3), 25; https://doi.org/10.3390/cryptography1030025
Action Date Notes Link
article pdf uploaded. 12 December 2017 16:56 CET Version of Record https://www.mdpi.com/2410-387X/1/3/25/pdf-vor
article pdf uploaded. 13 December 2017 12:09 CET Updated version of record https://www.mdpi.com/2410-387X/1/3/25/pdf
article xml uploaded. 13 December 2017 12:09 CET Original file https://www.mdpi.com/2410-387X/1/3/25/xml
article html file updated 13 December 2017 12:10 CET Original file -
article html file updated 18 April 2019 06:40 CEST Update -
article html file updated 2 May 2019 08:55 CEST Update -
article html file updated 29 September 2019 04:15 CEST Update -
article html file updated 8 February 2020 23:55 CET Update -
article html file updated 16 July 2022 07:56 CEST Update https://www.mdpi.com/2410-387X/1/3/25/html
Back to TopTop