Next Article in Journal
Redundancy in Key Management for WSNs
Previous Article in Journal
Trusted Time-Based Verification Model for Automatic Man-in-the-Middle Attack Detection in Cybersecurity
Previous Article in Special Issue
Efficient One-Time Signatures from Quasi-Cyclic Codes: A Full Treatment
 
 
Article

Article Versions Notes

Action Date Notes Link
article xml file uploaded 6 December 2018 11:24 CET Original file -
article xml uploaded. 6 December 2018 11:24 CET Update https://0-www-mdpi-com.brum.beds.ac.uk/2410-387X/2/4/39/xml
article pdf uploaded. 6 December 2018 11:24 CET Version of Record https://0-www-mdpi-com.brum.beds.ac.uk/2410-387X/2/4/39/pdf
article html file updated 6 December 2018 11:25 CET Original file -
article html file updated 2 April 2019 08:49 CEST Update -
article html file updated 13 April 2019 18:47 CEST Update -
article html file updated 27 April 2019 22:55 CEST Update -
article html file updated 11 October 2019 13:39 CEST Update -
article html file updated 11 February 2020 01:36 CET Update -
article html file updated 17 July 2022 13:42 CEST Update https://0-www-mdpi-com.brum.beds.ac.uk/2410-387X/2/4/39/html
Back to TopTop