Next Article in Journal
Intercept-Resend Emulation Attacks against a Continuous-Variable Quantum Authentication Protocol with Physical Unclonable Keys
Previous Article in Journal
Key Management Systems at the Cloud Scale
Previous Article in Special Issue
New Method of Prime Factorisation-Based Attacks on RSA Authentication in IoT
 
 
Article

Article Versions Notes

Action Date Notes Link
article xml file uploaded 9 September 2019 15:05 CEST Original file -
article pdf uploaded. 9 September 2019 15:05 CEST Version of Record https://0-www-mdpi-com.brum.beds.ac.uk/2410-387X/3/3/24/pdf-vor
article xml file uploaded 9 September 2019 15:09 CEST Update -
article pdf uploaded. 9 September 2019 15:09 CEST Updated version of record https://0-www-mdpi-com.brum.beds.ac.uk/2410-387X/3/3/24/pdf-vor
article xml file uploaded 20 September 2019 08:13 CEST Update -
article xml uploaded. 20 September 2019 08:13 CEST Update https://0-www-mdpi-com.brum.beds.ac.uk/2410-387X/3/3/24/xml
article pdf uploaded. 20 September 2019 08:13 CEST Updated version of record https://0-www-mdpi-com.brum.beds.ac.uk/2410-387X/3/3/24/pdf
article html file updated 20 September 2019 08:15 CEST Original file -
article html file updated 20 September 2019 08:16 CEST Update -
article html file updated 20 September 2019 08:18 CEST Update -
article html file updated 13 February 2020 16:21 CET Update -
article html file updated 20 July 2022 03:43 CEST Update https://0-www-mdpi-com.brum.beds.ac.uk/2410-387X/3/3/24/html
Back to TopTop