Previous Article in Journal
Composable Privacy-Preserving Framework for Stakes-Based Online Peer-to-Peer Applications
Previous Article in Special Issue
Enhancing Security for Resource-Constrained Smart Cities IoT Applications: Optimizing Cryptographic Techniques with Effective Field Multipliers
 
 
Article

Article Versions Notes

Cryptography 2025, 9(3), 50; https://doi.org/10.3390/cryptography9030050
Action Date Notes Link
article pdf uploaded. 3 July 2025 17:21 CEST Version of Record https://www.mdpi.com/2410-387X/9/3/50/pdf-vor
article xml file uploaded 4 July 2025 11:55 CEST Original file -
article xml uploaded. 4 July 2025 11:55 CEST Update https://www.mdpi.com/2410-387X/9/3/50/xml
article pdf uploaded. 4 July 2025 11:55 CEST Updated version of record https://www.mdpi.com/2410-387X/9/3/50/pdf
article html file updated 4 July 2025 11:58 CEST Original file https://www.mdpi.com/2410-387X/9/3/50/html
Back to TopTop