Next Article in Journal
CMCC: Misuse Resistant Authenticated Encryption with Minimal Ciphertext Expansion
Previous Article in Journal
Redundancy in Key Management for WSNs
 
 
Article

Article Versions Notes

Cryptography 2018, 2(4), 41; https://doi.org/10.3390/cryptography2040041
Action Date Notes Link
article xml file uploaded 11 December 2018 14:32 CET Original file -
article xml uploaded. 11 December 2018 14:32 CET Update https://www.mdpi.com/2410-387X/2/4/41/xml
article pdf uploaded. 11 December 2018 14:32 CET Version of Record https://www.mdpi.com/2410-387X/2/4/41/pdf
article html file updated 11 December 2018 14:33 CET Original file -
article html file updated 2 April 2019 11:36 CEST Update -
article html file updated 13 April 2019 16:37 CEST Update -
article html file updated 27 April 2019 20:45 CEST Update -
article html file updated 11 October 2019 19:31 CEST Update -
article html file updated 11 February 2020 02:35 CET Update -
article html file updated 17 July 2022 14:57 CEST Update https://www.mdpi.com/2410-387X/2/4/41/html
Back to TopTop