Next Article in Journal
Cryptography with Disposable Backdoors
Previous Article in Journal
New Method of Prime Factorisation-Based Attacks on RSA Authentication in IoT
 
 
Article

Article Versions Notes

Action Date Notes Link
article xml file uploaded 19 August 2019 13:44 CEST Original file -
article xml uploaded. 19 August 2019 13:44 CEST Update https://0-www-mdpi-com.brum.beds.ac.uk/2410-387X/3/3/21/xml
article pdf uploaded. 19 August 2019 13:44 CEST Version of Record https://0-www-mdpi-com.brum.beds.ac.uk/2410-387X/3/3/21/pdf
article html file updated 22 August 2019 14:07 CEST Original file -
article html file updated 13 February 2020 10:52 CET Update -
article html file updated 20 July 2022 04:59 CEST Update https://0-www-mdpi-com.brum.beds.ac.uk/2410-387X/3/3/21/html
Back to TopTop