Next Article in Journal
Privacy Protection Scheme for the Internet of Vehicles Based on Private Set Intersection
Next Article in Special Issue
Physical Visitor Access Control and Authentication Using Blockchain, Smart Contracts and Internet of Things
Previous Article in Journal
Intrusion Detection System for IoT Using Logical Analysis of Data and Information Gain Ratio
Previous Article in Special Issue
Process Authentication through Blockchain: Three Case Studies
 
 
Article

Article Versions Notes

Cryptography 2022, 6(4), 63; https://doi.org/10.3390/cryptography6040063
Action Date Notes Link
article xml file uploaded 6 December 2022 07:13 CET Original file -
article xml uploaded. 6 December 2022 07:13 CET Update -
article pdf uploaded. 6 December 2022 07:13 CET Version of Record https://www.mdpi.com/2410-387X/6/4/63/pdf-vor
article html file updated 6 December 2022 07:15 CET Original file -
article xml file uploaded 19 December 2022 05:02 CET Update -
article xml uploaded. 19 December 2022 05:02 CET Update -
article pdf uploaded. 19 December 2022 05:02 CET Updated version of record https://www.mdpi.com/2410-387X/6/4/63/pdf-vor
article html file updated 19 December 2022 05:04 CET Update -
article xml file uploaded 19 December 2022 05:14 CET Update -
article xml uploaded. 19 December 2022 05:14 CET Update https://www.mdpi.com/2410-387X/6/4/63/xml
article pdf uploaded. 19 December 2022 05:14 CET Updated version of record https://www.mdpi.com/2410-387X/6/4/63/pdf
article html file updated 19 December 2022 05:16 CET Update -
article html file updated 4 March 2023 01:32 CET Update https://www.mdpi.com/2410-387X/6/4/63/html
Back to TopTop