Next Article in Journal
On Detecting Relay Attacks on RFID Systems Using Qubits
Next Article in Special Issue
Securing Additive Manufacturing with Blockchains and Distributed Physically Unclonable Functions
Previous Article in Journal / Special Issue
On the Design and Analysis of a Biometric Authentication System Using Keystroke Dynamics
 
 
Article

Article Versions Notes

Action Date Notes Link
article xml file uploaded 10 April 2020 17:40 CEST Original file -
article xml uploaded. 10 April 2020 17:40 CEST Update https://0-www-mdpi-com.brum.beds.ac.uk/2410-387X/4/2/13/xml
article pdf uploaded. 10 April 2020 17:40 CEST Version of Record https://0-www-mdpi-com.brum.beds.ac.uk/2410-387X/4/2/13/pdf
article html file updated 10 April 2020 17:42 CEST Original file -
article html file updated 21 July 2022 01:35 CEST Update https://0-www-mdpi-com.brum.beds.ac.uk/2410-387X/4/2/13/html
Back to TopTop