Next Article in Journal
Hardware-Based Run-Time Code Integrity in Embedded Devices
Previous Article in Journal
Provably Secure Covert Communication on Blockchain
Previous Article in Special Issue
Performance Analysis of Secure and Private Billing Protocols for Smart Metering
 
 
Editorial

Article Versions Notes

Cryptography 2018, 2(3), 19; https://doi.org/10.3390/cryptography2030019
Action Date Notes Link
article xml file uploaded 22 August 2018 14:10 CEST Original file -
article xml uploaded. 22 August 2018 14:10 CEST Update -
article pdf uploaded. 22 August 2018 14:10 CEST Version of Record https://www.mdpi.com/2410-387X/2/3/19/pdf-vor
article html file updated 22 August 2018 14:11 CEST Original file -
article pdf uploaded. 30 August 2018 04:34 CEST Updated version of record https://www.mdpi.com/2410-387X/2/3/19/pdf
article xml uploaded. 30 August 2018 04:34 CEST Update https://www.mdpi.com/2410-387X/2/3/19/xml
article html file updated 30 August 2018 04:35 CEST Update -
article html file updated 31 March 2019 10:43 CEST Update -
article html file updated 15 April 2019 09:32 CEST Update -
article html file updated 29 April 2019 14:04 CEST Update -
article html file updated 10 February 2020 07:05 CET Update https://www.mdpi.com/2410-387X/2/3/19/html
Back to TopTop