Next Article in Journal
Chaotic Quantum Key Distribution
Next Article in Special Issue
Side-Channel Evaluation Methodology on Software
Previous Article in Journal
Security Analysis of Lightweight IoT Cipher: Chaskey
Previous Article in Special Issue
Power Side-Channel Attack Analysis: A Review of 20 Years of Study for the Layman
 
 
Article

Article Versions Notes

Action Date Notes Link
article pdf uploaded. 9 August 2020 11:16 CEST Version of Record https://0-www-mdpi-com.brum.beds.ac.uk/2410-387X/4/3/23/pdf-vor
article pdf uploaded. 11 August 2020 11:00 CEST Updated version of record https://0-www-mdpi-com.brum.beds.ac.uk/2410-387X/4/3/23/pdf-vor
article pdf uploaded. 11 August 2020 11:06 CEST Updated version of record https://0-www-mdpi-com.brum.beds.ac.uk/2410-387X/4/3/23/pdf-vor
article xml file uploaded 13 August 2020 06:37 CEST Original file -
article xml uploaded. 13 August 2020 06:37 CEST Update https://0-www-mdpi-com.brum.beds.ac.uk/2410-387X/4/3/23/xml
article pdf uploaded. 13 August 2020 06:37 CEST Updated version of record https://0-www-mdpi-com.brum.beds.ac.uk/2410-387X/4/3/23/pdf
article html file updated 13 August 2020 06:39 CEST Original file -
article html file updated 22 July 2022 02:57 CEST Update https://0-www-mdpi-com.brum.beds.ac.uk/2410-387X/4/3/23/html
Back to TopTop