Next Article in Journal
Key Management Systems at the Cloud Scale
Next Article in Special Issue
Intercept-Resend Emulation Attacks against a Continuous-Variable Quantum Authentication Protocol with Physical Unclonable Keys
Previous Article in Journal
Reversible Data Hiding for DICOM Image Using Lifting and Companding
 
 
Article

Article Versions Notes

Cryptography 2019, 3(3), 22; https://doi.org/10.3390/cryptography3030022
Action Date Notes Link
article xml file uploaded 20 August 2019 12:16 CEST Original file -
article xml uploaded. 20 August 2019 12:17 CEST Update https://www.mdpi.com/2410-387X/3/3/22/xml
article pdf uploaded. 20 August 2019 12:17 CEST Version of Record https://www.mdpi.com/2410-387X/3/3/22/pdf
article html file updated 20 August 2019 12:18 CEST Original file -
article html file updated 13 February 2020 11:05 CET Update -
article html file updated 20 July 2022 04:56 CEST Update https://www.mdpi.com/2410-387X/3/3/22/html
Back to TopTop