Next Article in Journal
Acknowledgement to Reviewers of Cryptography in 2017
Previous Article in Journal
Cryptographically Secure Multiparty Computation and Distributed Auctions Using Homomorphic Encryption
Previous Article in Special Issue
Anomalous Traffic Detection and Self-Similarity Analysis in the Environment of ATMSim
 
 
Article

Article Versions Notes

Action Date Notes Link
article pdf uploaded. 5 January 2018 17:14 CET Version of Record https://0-www-mdpi-com.brum.beds.ac.uk/2410-387X/2/1/1/pdf-vor
article pdf uploaded. 12 January 2018 09:53 CET Updated version of record https://0-www-mdpi-com.brum.beds.ac.uk/2410-387X/2/1/1/pdf
article xml uploaded. 12 January 2018 09:53 CET Original file https://0-www-mdpi-com.brum.beds.ac.uk/2410-387X/2/1/1/xml
article html file updated 12 January 2018 09:54 CET Original file -
article html file updated 28 March 2019 13:29 CET Update -
article html file updated 18 April 2019 02:11 CEST Update -
article html file updated 2 May 2019 04:05 CEST Update -
article html file updated 29 September 2019 17:09 CEST Update -
article html file updated 9 February 2020 02:10 CET Update -
article html file updated 16 July 2022 08:22 CEST Update https://0-www-mdpi-com.brum.beds.ac.uk/2410-387X/2/1/1/html
Back to TopTop