Next Article in Journal
Side-Channel Evaluation Methodology on Software
Next Article in Special Issue
Electromagnetic and Power Side-Channel Analysis: Advanced Attacks and Low-Overhead Generic Countermeasures through White-Box Approach
Previous Article in Journal
Practical and Provably Secure Distributed Aggregation: Verifiable Additive Homomorphic Secret Sharing
Previous Article in Special Issue
Securing Additive Manufacturing with Blockchains and Distributed Physically Unclonable Functions
 
 
Article

Article Versions Notes

Action Date Notes Link
article xml file uploaded 25 September 2020 09:00 CEST Original file -
article xml uploaded. 25 September 2020 09:01 CEST Update https://0-www-mdpi-com.brum.beds.ac.uk/2410-387X/4/4/26/xml
article pdf uploaded. 25 September 2020 09:01 CEST Version of Record https://0-www-mdpi-com.brum.beds.ac.uk/2410-387X/4/4/26/pdf
article html file updated 25 September 2020 09:04 CEST Original file -
article html file updated 22 July 2022 08:33 CEST Update https://0-www-mdpi-com.brum.beds.ac.uk/2410-387X/4/4/26/html
Back to TopTop