Next Article in Journal
Security and Performance of Single Sign-on Based on One-Time Pad Algorithm
Next Article in Special Issue
Hardware Performance Evaluation of Authenticated Encryption SAEAES with Threshold Implementation
Previous Article in Journal
On Detecting Relay Attacks on RFID Systems Using Qubits
 
 
Review

Article Versions Notes

Cryptography 2020, 4(2), 15; https://doi.org/10.3390/cryptography4020015
Action Date Notes Link
article xml file uploaded 19 May 2020 12:00 CEST Original file -
article pdf uploaded. 19 May 2020 12:00 CEST Version of Record https://www.mdpi.com/2410-387X/4/2/15/pdf-vor
article xml file uploaded 8 June 2020 10:54 CEST Update -
article xml uploaded. 8 June 2020 10:54 CEST Update -
article pdf uploaded. 8 June 2020 10:54 CEST Updated version of record https://www.mdpi.com/2410-387X/4/2/15/pdf-vor
article html file updated 8 June 2020 10:56 CEST Original file -
article xml file uploaded 23 June 2020 11:48 CEST Update -
article xml uploaded. 23 June 2020 11:48 CEST Update https://www.mdpi.com/2410-387X/4/2/15/xml
article pdf uploaded. 23 June 2020 11:48 CEST Updated version of record https://www.mdpi.com/2410-387X/4/2/15/pdf
article html file updated 23 June 2020 11:50 CEST Update -
article html file updated 21 July 2022 05:18 CEST Update https://www.mdpi.com/2410-387X/4/2/15/html
Back to TopTop