Next Article in Journal / Special Issue
Practically Feasible Robust Quantum Money with Classical Verification
Previous Article in Journal
Efficient and Flexible Multi-Factor Authentication Protocol Based on Fuzzy Extractor of Administrator’s Fingerprint and Smart Mobile Device
Previous Article in Special Issue
Cryptography with Disposable Backdoors
 
 
Article

Article Versions Notes

Cryptography 2019, 3(4), 25; https://doi.org/10.3390/cryptography3040025
Action Date Notes Link
article xml file uploaded 25 October 2019 15:47 CEST Original file -
article pdf uploaded. 25 October 2019 15:47 CEST Version of Record https://www.mdpi.com/2410-387X/3/4/25/pdf-vor
article xml file uploaded 2 November 2019 04:10 CET Update -
article xml uploaded. 2 November 2019 04:10 CET Update https://www.mdpi.com/2410-387X/3/4/25/xml
article pdf uploaded. 2 November 2019 04:10 CET Updated version of record https://www.mdpi.com/2410-387X/3/4/25/pdf
article html file updated 2 November 2019 04:12 CET Original file -
article html file updated 14 February 2020 04:05 CET Update -
article html file updated 20 July 2022 00:53 CEST Update https://www.mdpi.com/2410-387X/3/4/25/html
Back to TopTop