Next Article in Journal
PRIVocular: Enhancing User Privacy Through Air-Gapped Communication Channels
Next Article in Special Issue
Optimizing Group Multi-Factor Authentication for Secure and Efficient IoT Device Communications
Previous Article in Journal
Non-Degenerate One-Time Pad and Unconditional Integrity of Perfectly Secret Messages
Previous Article in Special Issue
A Self-Sovereign Identity Blockchain Framework for Access Control and Transparency in Financial Institutions
 
 
Article

Article Versions Notes

Cryptography 2025, 9(2), 28; https://doi.org/10.3390/cryptography9020028
Action Date Notes Link
article pdf uploaded. 29 April 2025 15:18 CEST Version of Record https://www.mdpi.com/2410-387X/9/2/28/pdf-vor
article xml file uploaded 7 May 2025 10:35 CEST Original file -
article xml uploaded. 7 May 2025 10:35 CEST Update https://www.mdpi.com/2410-387X/9/2/28/xml
article pdf uploaded. 7 May 2025 10:35 CEST Updated version of record https://www.mdpi.com/2410-387X/9/2/28/pdf
article html file updated 7 May 2025 10:38 CEST Original file https://www.mdpi.com/2410-387X/9/2/28/html
Back to TopTop