Next Article in Journal
Selection Strategy of F4-Style Algorithm to Solve MQ Problems Related to MPKC
Next Article in Special Issue
Neural Crypto-Coding Based Approach to Enhance the Security of Images over the Untrusted Cloud Environment
Previous Article in Journal
Linear Cryptanalysis of Reduced-Round Simeck Using Super Rounds
Previous Article in Special Issue
Blockchain of Resource-Efficient Anonymity Protection with Watermarking for IoT Big Data Market
 
 
Article

Article Versions Notes

Action Date Notes Link
article xml file uploaded 14 February 2023 15:59 CET Original file -
article xml uploaded. 14 February 2023 15:59 CET Update https://www.mdpi.com/2410-387X/7/1/9/xml
article pdf uploaded. 14 February 2023 15:59 CET Version of Record https://www.mdpi.com/2410-387X/7/1/9/pdf
article html file updated 14 February 2023 16:00 CET Original file -
article html file updated 14 February 2023 16:00 CET Update -
article html file updated 1 March 2023 14:18 CET Update https://www.mdpi.com/2410-387X/7/1/9/html
Back to TopTop