Next Article in Journal
Enhancing Security for Resource-Constrained Smart Cities IoT Applications: Optimizing Cryptographic Techniques with Effective Field Multipliers
Previous Article in Journal
Optimizing Group Multi-Factor Authentication for Secure and Efficient IoT Device Communications
 
 
Article

Article Versions Notes

Cryptography 2025, 9(2), 36; https://doi.org/10.3390/cryptography9020036
Action Date Notes Link
article xml file uploaded 29 May 2025 15:42 CEST Original file -
article xml uploaded. 29 May 2025 15:42 CEST Update -
article pdf uploaded. 29 May 2025 15:42 CEST Version of Record https://www.mdpi.com/2410-387X/9/2/36/pdf-vor
article html file updated 29 May 2025 15:44 CEST Original file -
article xml file uploaded 30 May 2025 12:25 CEST Update -
article xml uploaded. 30 May 2025 12:25 CEST Update https://www.mdpi.com/2410-387X/9/2/36/xml
article pdf uploaded. 30 May 2025 12:25 CEST Updated version of record https://www.mdpi.com/2410-387X/9/2/36/pdf
article html file updated 30 May 2025 12:29 CEST Update https://www.mdpi.com/2410-387X/9/2/36/html
Back to TopTop