Next Article in Journal
Improvements on Making BKW Practical for Solving LWE
Next Article in Special Issue
Cryptography as the Means to Protect Fundamental Human Rights
Previous Article in Journal / Special Issue
On General Data Protection Regulation Vulnerabilities and Privacy Issues, for Wearable Devices and Fitness Tracking Applications
 
 
Article

Article Versions Notes

Cryptography 2021, 5(4), 30; https://doi.org/10.3390/cryptography5040030
Action Date Notes Link
article pdf uploaded. 24 October 2021 14:55 CEST Version of Record https://www.mdpi.com/2410-387X/5/4/30/pdf-vor
article xml file uploaded 27 October 2021 11:55 CEST Original file -
article xml uploaded. 27 October 2021 11:55 CEST Update -
article pdf uploaded. 27 October 2021 11:55 CEST Updated version of record https://www.mdpi.com/2410-387X/5/4/30/pdf-vor
article html file updated 27 October 2021 11:56 CEST Original file -
article xml file uploaded 28 October 2021 04:50 CEST Update -
article xml uploaded. 28 October 2021 04:50 CEST Update -
article pdf uploaded. 28 October 2021 04:50 CEST Updated version of record https://www.mdpi.com/2410-387X/5/4/30/pdf-vor
article html file updated 28 October 2021 04:52 CEST Update -
article html file updated 28 October 2021 10:04 CEST Update -
article xml file uploaded 4 November 2021 08:03 CET Update -
article xml uploaded. 4 November 2021 08:03 CET Update https://www.mdpi.com/2410-387X/5/4/30/xml
article pdf uploaded. 4 November 2021 08:03 CET Updated version of record https://www.mdpi.com/2410-387X/5/4/30/pdf
article html file updated 4 November 2021 08:04 CET Update -
article html file updated 30 July 2022 12:48 CEST Update https://www.mdpi.com/2410-387X/5/4/30/html
Back to TopTop