Next Article in Journal
A Specification-Based IDS for Detecting Attacks on RPL-Based Network Topology
Next Article in Special Issue
Beamforming and Antenna Grouping Design for the Multi-Antenna Relay with Energy Harvesting to Improve Secrecy Rate
Previous Article in Journal
Using Proven Reference Monitor Patterns for Security Evaluation
 
 
Due to scheduled maintenance work on our database systems, there may be short service disruptions on this website between 10:00 and 11:00 CEST on June 14th.
Article

Article Versions Notes

Information 2016, 7(2), 24; https://doi.org/10.3390/info7020024
Action Date Notes Link
article pdf uploaded. 12 May 2016 10:23 CEST Version of Record https://www.mdpi.com/2078-2489/7/2/24/pdf-vor
article xml uploaded. 12 May 2016 10:23 CEST Original file -
article html file updated 12 May 2016 10:24 CEST Original file -
article pdf uploaded. 13 May 2016 12:51 CEST Updated version of record https://www.mdpi.com/2078-2489/7/2/24/pdf
article xml uploaded. 13 May 2016 12:51 CEST Update https://www.mdpi.com/2078-2489/7/2/24/xml
article html file updated 16 May 2016 22:49 CEST Update -
article html file updated 24 November 2016 22:46 CET Update -
article html file updated 27 March 2019 04:19 CET Update -
article html file updated 5 May 2019 16:13 CEST Update -
article html file updated 7 February 2020 08:29 CET Update https://www.mdpi.com/2078-2489/7/2/24/html
Back to TopTop