Next Article in Journal
Evaluating Cluster-Based Synthetic Data Generation for Blood-Transfusion Analysis
Next Article in Special Issue
Leveraging Towards Access Control, Identity Management, and Data Integrity Verification Mechanisms in Blockchain-Assisted Cloud Environments: A Comparative Study
Previous Article in Journal
Challenging Assumptions of Normality in AES s-Box Configurations under Side-Channel Analysis
Previous Article in Special Issue
Security in Cloud-Native Services: A Survey
 
 
Article

Article Versions Notes

J. Cybersecur. Priv. 2023, 3(4), 858-881; https://doi.org/10.3390/jcp3040039
Action Date Notes Link
article xml file uploaded 1 December 2023 03:55 CET Original file -
article xml uploaded. 1 December 2023 03:55 CET Update https://www.mdpi.com/2624-800X/3/4/39/xml
article pdf uploaded. 1 December 2023 03:55 CET Version of Record https://www.mdpi.com/2624-800X/3/4/39/pdf
article html file updated 1 December 2023 03:56 CET Original file https://www.mdpi.com/2624-800X/3/4/39/html
Back to TopTop