Next Article in Journal
Computer Simulations of Soft Matter: Linking the Scales
Next Article in Special Issue
Improving the Authentication Scheme and Access Control Protocol for VANETs
Previous Article in Journal
Characterizing the Asymptotic Per-Symbol Redundancy of Memoryless Sources over Countable Alphabets in Terms of Single-Letter Marginals
Previous Article in Special Issue
Quantum Flows for Secret Key Distribution in the Presence of the Photon Number Splitting Attack
Open AccessArticle

Article Versions Notes

Entropy 2014, 16(8), 4185-4198; https://doi.org/10.3390/e16084185
Action Date Notes Link
article pdf uploaded. 24 July 2014 13:16 CEST Version of Record https://www.mdpi.com/1099-4300/16/8/4185/pdf-vor
article pdf uploaded. 25 July 2014 15:33 CEST Updated version of record https://www.mdpi.com/1099-4300/16/8/4185/pdf
article xml file uploaded 15 September 2014 05:31 CEST Original file https://www.mdpi.com/1099-4300/16/8/4185/xml
article html file updated 15 September 2014 05:31 CEST Original file -
article html file updated 20 August 2015 13:36 CEST Update -
article html file updated 21 March 2019 21:41 CET Update -
article html file updated 7 May 2019 11:05 CEST Update https://www.mdpi.com/1099-4300/16/8/4185/html
Back to TopTop