Next Article in Journal
Information-Theoretically Secure Data Origin Authentication with Quantum and Classical Resources
Next Article in Special Issue
Why Is Deep Learning Challenging for Printed Circuit Board (PCB) Component Recognition and How Can We Address It?
Previous Article in Journal
ESPADE: An Efficient and Semantically Secure Shortest Path Discovery for Outsourced Location-Based Services
Previous Article in Special Issue
Secure Boot for Reconfigurable Architectures
Open AccessArticle

Article Versions Notes

Action Date Notes Link
article pdf uploaded. 31 October 2020 04:18 CET Updated version of record https://0-www-mdpi-com.brum.beds.ac.uk/2410-387X/4/4/30/pdf
article xml file uploaded 5 November 2020 10:55 CET Update https://0-www-mdpi-com.brum.beds.ac.uk/2410-387X/4/4/30/xml
article xml uploaded. 5 November 2020 10:55 CET Update https://0-www-mdpi-com.brum.beds.ac.uk/2410-387X/4/4/30/xml
article pdf uploaded. 5 November 2020 10:55 CET Updated version of record https://0-www-mdpi-com.brum.beds.ac.uk/2410-387X/4/4/30/pdf
article html file updated 5 November 2020 10:58 CET Update https://0-www-mdpi-com.brum.beds.ac.uk/2410-387X/4/4/30/html
article html file updated 4 December 2020 11:46 CET Update https://0-www-mdpi-com.brum.beds.ac.uk/2410-387X/4/4/30/html
Back to TopTop