Next Article in Journal
Security Analysis of Lightweight IoT Cipher: Chaskey
Next Article in Special Issue
Chaotic Quantum Key Distribution
Previous Article in Journal
Optimized CSIDH Implementation Using a 2-Torsion Point
Previous Article in Special Issue
Security and Performance of Single Sign-on Based on One-Time Pad Algorithm
 
 
Article

Article Versions Notes

Action Date Notes Link
article pdf uploaded. 30 July 2020 10:13 CEST Version of Record https://0-www-mdpi-com.brum.beds.ac.uk/2410-387X/4/3/21/pdf-vor
article xml file uploaded 3 August 2020 04:56 CEST Original file -
article xml uploaded. 3 August 2020 04:56 CEST Update https://0-www-mdpi-com.brum.beds.ac.uk/2410-387X/4/3/21/xml
article pdf uploaded. 3 August 2020 04:56 CEST Updated version of record https://0-www-mdpi-com.brum.beds.ac.uk/2410-387X/4/3/21/pdf
article html file updated 3 August 2020 04:58 CEST Original file -
article html file updated 22 July 2022 01:49 CEST Update https://0-www-mdpi-com.brum.beds.ac.uk/2410-387X/4/3/21/html
Back to TopTop