Next Article in Journal
Forward-Secure Linkable Ring Signatures from Bilinear Maps
Next Article in Special Issue
Redundancy in Key Management for WSNs
Previous Article in Journal
Revocable Identity-Based Encryption and Server-Aided Revocable IBE from the Computational Diffie-Hellman Assumption
Open AccessArticle

Article Versions Notes

Cryptography 2018, 2(4), 34; https://doi.org/10.3390/cryptography2040034
Action Date Notes Link
article xml file uploaded 2 November 2018 12:36 CET Update https://www.mdpi.com/2410-387X/2/4/34/xml
article xml uploaded. 2 November 2018 12:36 CET Update https://www.mdpi.com/2410-387X/2/4/34/xml
article pdf uploaded. 2 November 2018 12:36 CET Updated version of record https://www.mdpi.com/2410-387X/2/4/34/pdf
article html file updated 2 November 2018 12:37 CET Update https://www.mdpi.com/2410-387X/2/4/34/html
article html file updated 1 April 2019 16:03 CEST Update https://www.mdpi.com/2410-387X/2/4/34/html
article html file updated 14 April 2019 08:03 CEST Update https://www.mdpi.com/2410-387X/2/4/34/html
article html file updated 28 April 2019 12:46 CEST Update https://www.mdpi.com/2410-387X/2/4/34/html
article html file updated 9 October 2019 23:08 CEST Update https://www.mdpi.com/2410-387X/2/4/34/html
Back to TopTop