Next Article in Journal
Complementing Privacy and Utility Trade-Off with Self-Organising Maps
Next Article in Special Issue
Implementing Privacy-Preserving Genotype Analysis with Consideration for Population Stratification
Previous Article in Journal
A Delay-Based Machine Learning Model for DMA Attack Mitigation
 
 
Article

Article Versions Notes

Cryptography 2021, 5(3), 19; https://doi.org/10.3390/cryptography5030019
Action Date Notes Link
article xml file uploaded 12 August 2021 08:35 CEST Original file -
article xml uploaded. 12 August 2021 08:35 CEST Update -
article pdf uploaded. 12 August 2021 08:35 CEST Version of Record https://www.mdpi.com/2410-387X/5/3/19/pdf-vor
article html file updated 12 August 2021 08:37 CEST Original file -
article xml file uploaded 19 August 2021 07:38 CEST Update -
article xml uploaded. 19 August 2021 07:38 CEST Update https://www.mdpi.com/2410-387X/5/3/19/xml
article pdf uploaded. 19 August 2021 07:38 CEST Updated version of record https://www.mdpi.com/2410-387X/5/3/19/pdf
article html file updated 19 August 2021 07:39 CEST Update -
article html file updated 28 July 2022 05:38 CEST Update https://www.mdpi.com/2410-387X/5/3/19/html
Back to TopTop