Next Article in Journal
Special Issue on Cryptographic Protocols
Next Article in Special Issue
Applications of Blockchain Technology in Medicine and Healthcare: Challenges and Future Perspectives
Previous Article in Journal
Non-Invasive Detection Method for Recycled Flash Memory Using Timing Characteristics
 
 
Article

Article Versions Notes

Cryptography 2018, 2(3), 18; https://doi.org/10.3390/cryptography2030018
Action Date Notes Link
article xml file uploaded 20 August 2018 15:09 CEST Original file -
article pdf uploaded. 20 August 2018 15:09 CEST Version of Record https://www.mdpi.com/2410-387X/2/3/18/pdf-vor
article pdf uploaded. 20 August 2018 15:12 CEST Updated version of record https://www.mdpi.com/2410-387X/2/3/18/pdf-vor
article xml file uploaded 22 August 2018 12:11 CEST Update -
article xml uploaded. 22 August 2018 12:11 CEST Update https://www.mdpi.com/2410-387X/2/3/18/xml
article pdf uploaded. 22 August 2018 12:11 CEST Updated version of record https://www.mdpi.com/2410-387X/2/3/18/pdf
article html file updated 22 August 2018 12:12 CEST Original file -
article html file updated 31 March 2019 09:54 CEST Update -
article html file updated 15 April 2019 10:20 CEST Update -
article html file updated 29 April 2019 14:55 CEST Update -
article html file updated 10 February 2020 06:43 CET Update -
article html file updated 17 July 2022 01:13 CEST Update https://www.mdpi.com/2410-387X/2/3/18/html
Back to TopTop