Next Article in Journal
Can Ternary Computing Improve Information Assurance?
Next Article in Special Issue
Robust Secure Authentication and Data Storage with Perfect Secrecy
Previous Article in Journal
Fault Attacks on the Authenticated Encryption Stream Cipher MORUS
Previous Article in Special Issue
A Privacy-Preserving, Mutual PUF-Based Authentication Protocol
 
 
Article

Article Versions Notes

Action Date Notes Link
article pdf uploaded. 7 February 2018 05:52 CET Version of Record https://www.mdpi.com/2410-387X/2/1/5/pdf
article xml uploaded. 7 February 2018 05:52 CET Original file https://www.mdpi.com/2410-387X/2/1/5/xml
article html file updated 7 February 2018 05:54 CET Original file -
article html file updated 28 March 2019 21:27 CET Update -
article html file updated 17 April 2019 19:27 CEST Update -
article html file updated 1 May 2019 20:24 CEST Update -
article html file updated 30 September 2019 14:13 CEST Update -
article html file updated 9 February 2020 05:46 CET Update https://www.mdpi.com/2410-387X/2/1/5/html
Back to TopTop