Next Article in Journal
NLU-V: A Family of Instruction Set Extensions for Efficient Symmetric Cryptography on RISC-V
Previous Article in Journal
Threats, Attacks, and Cryptography Frameworks of Cybersecurity in Critical Infrastructures
Previous Article in Special Issue
A Publicly Verifiable E-Voting System Based on Biometrics
 
 
Article

Article Versions Notes

Action Date Notes Link
article xml file uploaded 27 February 2024 11:16 CET Original file -
article xml uploaded. 27 February 2024 11:16 CET Update -
article pdf uploaded. 27 February 2024 11:16 CET Version of Record https://www.mdpi.com/2410-387X/8/1/8/pdf-vor
article html file updated 27 February 2024 11:18 CET Original file -
article xml file uploaded 28 February 2024 02:01 CET Update -
article xml uploaded. 28 February 2024 02:01 CET Update https://www.mdpi.com/2410-387X/8/1/8/xml
article pdf uploaded. 28 February 2024 02:01 CET Updated version of record https://www.mdpi.com/2410-387X/8/1/8/pdf
article html file updated 28 February 2024 02:03 CET Update https://www.mdpi.com/2410-387X/8/1/8/html
Back to TopTop