Next Article in Journal
Light Weight Authentication Scheme for Smart Home IoT Devices
Next Article in Special Issue
Attribute-Based Encryption in Securing Big Data from Post-Quantum Perspective: A Survey
Previous Article in Journal
Physical Layer Security Design for Polar Code Construction
Previous Article in Special Issue
Tightly Secure PKE Combiner in the Quantum Random Oracle Model
 
 
Article

Article Versions Notes

Cryptography 2022, 6(3), 36; https://doi.org/10.3390/cryptography6030036
Action Date Notes Link
article pdf uploaded. 6 July 2022 12:54 CEST Version of Record https://www.mdpi.com/2410-387X/6/3/36/pdf-vor
article xml file uploaded 7 July 2022 05:07 CEST Original file -
article xml uploaded. 7 July 2022 05:07 CEST Update -
article pdf uploaded. 7 July 2022 05:07 CEST Updated version of record https://www.mdpi.com/2410-387X/6/3/36/pdf-vor
article html file updated 7 July 2022 05:09 CEST Original file -
article html file updated 7 July 2022 10:23 CEST Update -
article xml file uploaded 2 August 2022 09:36 CEST Update -
article xml uploaded. 2 August 2022 09:36 CEST Update https://www.mdpi.com/2410-387X/6/3/36/xml
article pdf uploaded. 2 August 2022 09:36 CEST Updated version of record https://www.mdpi.com/2410-387X/6/3/36/pdf
article html file updated 2 August 2022 09:38 CEST Update -
article html file updated 13 August 2022 00:27 CEST Update https://www.mdpi.com/2410-387X/6/3/36/html
Back to TopTop