Next Article in Journal
Improving User Privacy in Identity-Based Encryption Environments
Next Article in Special Issue
Intrusion Detection System for IoT Using Logical Analysis of Data and Information Gain Ratio
Previous Article in Journal
WPAxFuzz: Sniffing Out Vulnerabilities in Wi-Fi Implementations
Previous Article in Special Issue
How Hard Is It to Detect Surveillance? A Formal Study of Panopticons and Their Detectability Problem

Article Versions Notes

Cryptography 2022, 6(4), 54;
Action Date Notes Link
article pdf uploaded. 28 October 2022 13:52 CEST Version of Record
article xml file uploaded 31 October 2022 09:44 CET Original file -
article xml uploaded. 31 October 2022 09:44 CET Update
article pdf uploaded. 31 October 2022 09:44 CET Updated version of record
article html file updated 31 October 2022 09:46 CET Original file -
article html file updated 4 November 2022 11:34 CET Update -
article html file updated 2 March 2023 01:15 CET Update
Back to TopTop