Next Article in Journal
Anomalous Traffic Detection and Self-Similarity Analysis in the Environment of ATMSim
Next Article in Special Issue
An Overview of DRAM-Based Security Primitives
Previous Article in Journal
Learning Global-Local Distance Metrics for Signature-Based Biometric Cryptosystems
Previous Article in Special Issue
Leveraging Distributions in Physical Unclonable Functions
 
 
Article

Article Versions Notes

Cryptography 2017, 1(3), 23; https://doi.org/10.3390/cryptography1030023
Action Date Notes Link
article pdf uploaded. 9 December 2017 12:06 CET Version of Record https://www.mdpi.com/2410-387X/1/3/23/pdf-vor
article xml uploaded. 9 December 2017 12:06 CET Original file -
article xml uploaded. 9 December 2017 12:06 CET Update -
article html file updated 9 December 2017 12:08 CET Original file -
article pdf uploaded. 18 December 2017 07:49 CET Updated version of record https://www.mdpi.com/2410-387X/1/3/23/pdf
article xml uploaded. 18 December 2017 07:49 CET Update -
article xml uploaded. 18 December 2017 07:49 CET Update https://www.mdpi.com/2410-387X/1/3/23/xml
article html file updated 18 December 2017 07:50 CET Update -
article html file updated 18 April 2019 07:14 CEST Update -
article html file updated 2 May 2019 09:32 CEST Update -
article html file updated 29 September 2019 02:39 CEST Update -
article html file updated 8 February 2020 23:39 CET Update -
article html file updated 16 July 2022 07:52 CEST Update https://www.mdpi.com/2410-387X/1/3/23/html
Back to TopTop