Next Article in Journal
Improving User Privacy in Identity-Based Encryption Environments
Next Article in Special Issue
Intrusion Detection System for IoT Using Logical Analysis of Data and Information Gain Ratio
Previous Article in Journal
WPAxFuzz: Sniffing Out Vulnerabilities in Wi-Fi Implementations
Previous Article in Special Issue
How Hard Is It to Detect Surveillance? A Formal Study of Panopticons and Their Detectability Problem
 
 
Article

Article Versions Notes

Cryptography 2022, 6(4), 54; https://doi.org/10.3390/cryptography6040054
Action Date Notes Link
article pdf uploaded. 28 October 2022 13:52 CEST Version of Record https://www.mdpi.com/2410-387X/6/4/54/pdf-vor
article xml file uploaded 31 October 2022 09:44 CET Original file -
article xml uploaded. 31 October 2022 09:44 CET Update https://www.mdpi.com/2410-387X/6/4/54/xml
article pdf uploaded. 31 October 2022 09:44 CET Updated version of record https://www.mdpi.com/2410-387X/6/4/54/pdf
article html file updated 31 October 2022 09:46 CET Original file -
article html file updated 4 November 2022 11:34 CET Update -
article html file updated 2 March 2023 01:15 CET Update https://www.mdpi.com/2410-387X/6/4/54/html
Back to TopTop