Next Article in Journal
A Delay-Based Machine Learning Model for DMA Attack Mitigation
Next Article in Special Issue
Complementing Privacy and Utility Trade-Off with Self-Organising Maps
Previous Article in Journal
SC-DDPL as a Countermeasure against Static Power Side-Channel Attacks
Previous Article in Special Issue
Practical and Provably Secure Distributed Aggregation: Verifiable Additive Homomorphic Secret Sharing
 
 
Article

Article Versions Notes

Cryptography 2021, 5(3), 17; https://doi.org/10.3390/cryptography5030017
Action Date Notes Link
article pdf uploaded. 13 July 2021 16:59 CEST Version of Record https://www.mdpi.com/2410-387X/5/3/17/pdf-vor
article xml file uploaded 14 July 2021 10:40 CEST Original file -
article xml uploaded. 14 July 2021 10:40 CEST Update https://www.mdpi.com/2410-387X/5/3/17/xml
article pdf uploaded. 14 July 2021 10:40 CEST Updated version of record https://www.mdpi.com/2410-387X/5/3/17/pdf
article html file updated 14 July 2021 10:41 CEST Original file -
article html file updated 15 July 2021 10:03 CEST Update -
article html file updated 27 July 2022 04:42 CEST Update https://www.mdpi.com/2410-387X/5/3/17/html
Back to TopTop