Next Article in Journal
The Importance of the Security Culture in SMEs as Regards the Correct Management of the Security of Their Assets
Next Article in Special Issue
A Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios
Previous Article in Journal
Substring Position Search over Encrypted Cloud Data Supporting Efficient Multi-User Setup
 
 
Article

Article Versions Notes

Future Internet 2016, 8(3), 29; https://doi.org/10.3390/fi8030029
Action Date Notes Link
article pdf uploaded. 5 July 2016 08:12 CEST Version of Record https://www.mdpi.com/1999-5903/8/3/29/pdf
article xml uploaded. 5 July 2016 08:12 CEST Original file https://www.mdpi.com/1999-5903/8/3/29/xml
article html file updated 5 July 2016 08:14 CEST Original file -
article html file updated 27 March 2019 09:23 CET Update -
article html file updated 5 May 2019 11:00 CEST Update -
article html file updated 7 February 2020 11:13 CET Update https://www.mdpi.com/1999-5903/8/3/29/html
Back to TopTop