Next Article in Journal
Security Incident Information Exchange for Cloud Service Provisioning Chains
Previous Article in Journal
Security and Cryptographic Challenges for Authentication Based on Biometrics Data
Previous Article in Special Issue
An Enhanced Key Management Scheme for LoRaWAN
Open AccessArticle

Article Versions Notes

Cryptography 2018, 2(4), 40; https://doi.org/10.3390/cryptography2040040
Action Date Notes Link
article xml file uploaded 8 December 2018 11:43 CET Update https://www.mdpi.com/2410-387X/2/4/40/xml
article xml uploaded. 8 December 2018 11:43 CET Update https://www.mdpi.com/2410-387X/2/4/40/xml
article pdf uploaded. 8 December 2018 11:43 CET Updated version of record https://www.mdpi.com/2410-387X/2/4/40/pdf
article html file updated 8 December 2018 11:44 CET Update https://www.mdpi.com/2410-387X/2/4/40/html
article html file updated 2 April 2019 10:15 CEST Update https://www.mdpi.com/2410-387X/2/4/40/html
article html file updated 13 April 2019 17:43 CEST Update https://www.mdpi.com/2410-387X/2/4/40/html
article html file updated 27 April 2019 21:51 CEST Update https://www.mdpi.com/2410-387X/2/4/40/html
article html file updated 11 October 2019 16:39 CEST Update https://www.mdpi.com/2410-387X/2/4/40/html
Back to TopTop