Next Article in Journal
A Yielding Protocol that Uses Inter-Vehicle Communication to Improve the Traffic of Vehicles on a Low-Priority Road at an Unsignalized Intersection
Next Article in Special Issue
Cyber-Storms Come from Clouds: Security of Cloud Computing in the IoT Era
Previous Article in Journal
A Lightweight Elliptic-Elgamal-Based Authentication Scheme for Secure Device-to-Device Communication
Previous Article in Special Issue
Simulating Fog and Edge Computing Scenarios: An Overview and Research Challenges
 
 
Article

Article Versions Notes

Future Internet 2019, 11(5), 109; https://doi.org/10.3390/fi11050109
Action Date Notes Link
article xml file uploaded 8 May 2019 02:58 CEST Original file -
article xml uploaded. 8 May 2019 02:58 CEST Update https://www.mdpi.com/1999-5903/11/5/109/xml
article pdf uploaded. 8 May 2019 02:58 CEST Version of Record https://www.mdpi.com/1999-5903/11/5/109/pdf
article html file updated 8 May 2019 04:59 CEST Original file -
article html file updated 4 June 2019 17:53 CEST Update -
article html file updated 19 October 2019 17:09 CEST Update -
article html file updated 12 February 2020 10:36 CET Update https://www.mdpi.com/1999-5903/11/5/109/html
Back to TopTop