Next Article in Journal
Security Incident Information Exchange for Cloud Service Provisioning Chains
Previous Article in Journal
Security and Cryptographic Challenges for Authentication Based on Biometrics Data
Previous Article in Special Issue
An Enhanced Key Management Scheme for LoRaWAN
 
 
Article

Article Versions Notes

Cryptography 2018, 2(4), 40; https://doi.org/10.3390/cryptography2040040
Action Date Notes Link
article xml file uploaded 8 December 2018 11:43 CET Original file -
article xml uploaded. 8 December 2018 11:43 CET Update https://www.mdpi.com/2410-387X/2/4/40/xml
article pdf uploaded. 8 December 2018 11:43 CET Version of Record https://www.mdpi.com/2410-387X/2/4/40/pdf
article html file updated 8 December 2018 11:44 CET Original file -
article html file updated 2 April 2019 10:15 CEST Update -
article html file updated 13 April 2019 17:43 CEST Update -
article html file updated 27 April 2019 21:51 CEST Update -
article html file updated 11 October 2019 16:39 CEST Update -
article html file updated 11 February 2020 02:05 CET Update -
article html file updated 17 July 2022 14:19 CEST Update https://www.mdpi.com/2410-387X/2/4/40/html
Back to TopTop