Next Article in Journal
Biometric-Based Key Generation and User Authentication Using Voice Password Images and Neural Fuzzy Extractor
Previous Article in Journal
Securing Cyber Physical Systems: Lightweight Industrial Internet of Things Authentication (LI2A) for Critical Infrastructure and Manufacturing
 
 
Due to scheduled maintenance work on our servers, there may be short service disruptions on this website between 11:00 and 12:00 CEST on March 28th.
Article

Article Versions Notes

Appl. Syst. Innov. 2025, 8(1), 12; https://doi.org/10.3390/asi8010012
Action Date Notes Link
article html file updated 24 June 2025 12:44 CEST Update https://www.mdpi.com/2571-5577/8/1/12/html
article html file updated 16 January 2025 10:03 CET Original file -
article pdf uploaded. 16 January 2025 09:59 CET Version of Record https://www.mdpi.com/2571-5577/8/1/12/pdf
article xml uploaded. 16 January 2025 09:59 CET Update https://www.mdpi.com/2571-5577/8/1/12/xml
article xml file uploaded 16 January 2025 09:59 CET Original file -
Back to TopTop