Next Article in Journal
New Authentication Algorithm Based on Verifiable Encryption with Digital Identity
Previous Article in Journal
Key Generation for Hardware Obfuscation Using Strong PUFs
 
 
Article

Article Versions Notes

Cryptography 2019, 3(3), 18; https://doi.org/10.3390/cryptography3030018
Action Date Notes Link
article xml file uploaded 20 July 2019 12:34 CEST Original file -
article xml uploaded. 20 July 2019 12:34 CEST Update -
article pdf uploaded. 20 July 2019 12:34 CEST Version of Record https://www.mdpi.com/2410-387X/3/3/18/pdf-vor
article html file updated 20 July 2019 12:35 CEST Original file -
article xml file uploaded 22 July 2019 11:38 CEST Update -
article xml uploaded. 22 July 2019 11:38 CEST Update https://www.mdpi.com/2410-387X/3/3/18/xml
article pdf uploaded. 22 July 2019 11:38 CEST Updated version of record https://www.mdpi.com/2410-387X/3/3/18/pdf
article html file updated 22 July 2019 11:40 CEST Update -
article html file updated 13 February 2020 03:52 CET Update https://www.mdpi.com/2410-387X/3/3/18/html
Back to TopTop