Next Article in Journal
A Text-Independent Speaker Authentication System for Mobile Devices
Next Article in Special Issue
Synchronization in Quantum Key Distribution Systems
Previous Article in Journal
Recursive Cheating Strategies for the Relativistic FQ Bit Commitment Protocol
Previous Article in Special Issue
Transparent, Auditable, and Stepwise Verifiable Online E-Voting Enabling an Open and Fair Election
 
 
Article

Article Versions Notes

Cryptography 2017, 1(2), 15; https://doi.org/10.3390/cryptography1020015
Action Date Notes Link
article pdf uploaded. 1 September 2017 12:50 CEST Version of Record https://www.mdpi.com/2410-387X/1/2/15/pdf
article xml uploaded. 1 September 2017 12:50 CEST Original file https://www.mdpi.com/2410-387X/1/2/15/xml
article html file updated 1 September 2017 12:51 CEST Original file -
article html file updated 3 May 2019 04:03 CEST Update -
article html file updated 26 September 2019 21:23 CEST Update -
article html file updated 8 February 2020 15:03 CET Update https://www.mdpi.com/2410-387X/1/2/15/html
Back to TopTop