Next Article in Journal
Constrained Device Performance Benchmarking with the Implementation of Post-Quantum Cryptography
Previous Article in Journal
Auditable Anonymous Electronic Examination
 
 
Article

Article Versions Notes

Cryptography 2024, 8(2), 20; https://doi.org/10.3390/cryptography8020020
Action Date Notes Link
article xml file uploaded 9 May 2024 17:33 CEST Original file -
article xml uploaded. 9 May 2024 17:33 CEST Update -
article pdf uploaded. 9 May 2024 17:33 CEST Version of Record https://www.mdpi.com/2410-387X/8/2/20/pdf-vor
article html file updated 9 May 2024 17:34 CEST Original file -
article xml file uploaded 13 May 2024 15:32 CEST Update -
article xml uploaded. 13 May 2024 15:32 CEST Update -
article pdf uploaded. 13 May 2024 15:32 CEST Updated version of record https://www.mdpi.com/2410-387X/8/2/20/pdf-vor
article html file updated 13 May 2024 15:35 CEST Update -
article xml file uploaded 16 May 2024 16:38 CEST Update -
article xml uploaded. 16 May 2024 16:38 CEST Update https://www.mdpi.com/2410-387X/8/2/20/xml
article pdf uploaded. 16 May 2024 16:38 CEST Updated version of record https://www.mdpi.com/2410-387X/8/2/20/pdf
article html file updated 16 May 2024 16:39 CEST Update https://www.mdpi.com/2410-387X/8/2/20/html
Back to TopTop