Next Article in Journal
Computer Simulations of Soft Matter: Linking the Scales
Next Article in Special Issue
Improving the Authentication Scheme and Access Control Protocol for VANETs
Previous Article in Journal
Characterizing the Asymptotic Per-Symbol Redundancy of Memoryless Sources over Countable Alphabets in Terms of Single-Letter Marginals
Previous Article in Special Issue
Quantum Flows for Secret Key Distribution in the Presence of the Photon Number Splitting Attack
 
 
Article

Article Versions Notes

Entropy 2014, 16(8), 4185-4198; https://doi.org/10.3390/e16084185
Action Date Notes Link
article pdf uploaded. 24 July 2014 13:16 CEST Version of Record https://www.mdpi.com/1099-4300/16/8/4185/pdf-vor
article pdf uploaded. 25 July 2014 15:33 CEST Updated version of record https://www.mdpi.com/1099-4300/16/8/4185/pdf
article xml file uploaded 15 September 2014 05:31 CEST Original file https://www.mdpi.com/1099-4300/16/8/4185/xml
article html file updated 15 September 2014 05:31 CEST Original file -
article html file updated 20 August 2015 13:36 CEST Update -
article html file updated 21 March 2019 21:41 CET Update -
article html file updated 7 May 2019 11:05 CEST Update -
article html file updated 6 February 2020 10:58 CET Update https://www.mdpi.com/1099-4300/16/8/4185/html
Back to TopTop