Next Article in Journal
Cryptanalysis of Round-Reduced Fantomas, Robin and iSCREAM
Next Article in Special Issue
Automating Privacy Compliance Using Policy Integrated Blockchain
Previous Article in Journal
New Cryptanalytic Attack on RSA Modulus N = pq Using Small Prime Difference Method
Previous Article in Special Issue
Provably Secure Covert Communication on Blockchain
 
 
Article

Article Versions Notes

Action Date Notes Link
article xml file uploaded 2 January 2019 10:25 CET Original file -
article xml uploaded. 2 January 2019 10:25 CET Update https://www.mdpi.com/2410-387X/3/1/3/xml
article pdf uploaded. 2 January 2019 10:25 CET Version of Record https://www.mdpi.com/2410-387X/3/1/3/pdf
article html file updated 2 January 2019 10:27 CET Original file -
article html file updated 26 February 2019 12:10 CET Update -
article html file updated 2 April 2019 21:11 CEST Update -
article html file updated 13 April 2019 08:20 CEST Update -
article html file updated 27 April 2019 12:22 CEST Update -
article html file updated 12 October 2019 18:32 CEST Update -
article html file updated 11 February 2020 06:16 CET Update -
article html file updated 17 July 2022 20:17 CEST Update https://www.mdpi.com/2410-387X/3/1/3/html
Back to TopTop