Next Article in Journal
A Secure Approach Out-of-Band for e-Bank with Visual Two-Factor Authorization Protocol
Previous Article in Journal
Design and Performance Evaluation of an Authentic End-to-End Communication Model on Large-Scale Hybrid IPv4-IPv6 Virtual Networks to Detect MITM Attacks
 
 
Article

Article Versions Notes

Cryptography 2024, 8(4), 50; https://doi.org/10.3390/cryptography8040050
Action Date Notes Link
article pdf uploaded. 28 October 2024 16:22 CET Version of Record https://www.mdpi.com/2410-387X/8/4/50/pdf-vor
article xml file uploaded 31 October 2024 11:00 CET Original file -
article xml uploaded. 31 October 2024 11:00 CET Update https://www.mdpi.com/2410-387X/8/4/50/xml
article pdf uploaded. 31 October 2024 11:00 CET Updated version of record https://www.mdpi.com/2410-387X/8/4/50/pdf
article html file updated 31 October 2024 11:03 CET Original file https://www.mdpi.com/2410-387X/8/4/50/html
Back to TopTop