Next Article in Journal
Grid Cyber-Security Strategy in an Attacker-Defender Model
Next Article in Special Issue
Improvements on Making BKW Practical for Solving LWE
Previous Article in Journal
The Cryptographic Complexity of Anonymous Coins: A Systematic Exploration
Article

Article Versions Notes

Action Date Notes Link
article pdf uploaded. 15 March 2021 12:05 CET Updated version of record https://0-www-mdpi-com.brum.beds.ac.uk/2410-387X/5/1/11/pdf
article xml file uploaded 24 March 2021 05:12 CET Update https://0-www-mdpi-com.brum.beds.ac.uk/2410-387X/5/1/11/xml
article xml uploaded. 24 March 2021 05:12 CET Update https://0-www-mdpi-com.brum.beds.ac.uk/2410-387X/5/1/11/xml
article pdf uploaded. 24 March 2021 05:12 CET Updated version of record https://0-www-mdpi-com.brum.beds.ac.uk/2410-387X/5/1/11/pdf
article html file updated 24 March 2021 05:14 CET Update https://0-www-mdpi-com.brum.beds.ac.uk/2410-387X/5/1/11/html
article html file updated 24 March 2021 10:00 CET Update https://0-www-mdpi-com.brum.beds.ac.uk/2410-387X/5/1/11/html
article xml file uploaded 25 March 2021 02:02 CET Update https://0-www-mdpi-com.brum.beds.ac.uk/2410-387X/5/1/11/xml
article xml uploaded. 25 March 2021 02:02 CET Update https://0-www-mdpi-com.brum.beds.ac.uk/2410-387X/5/1/11/xml
article pdf uploaded. 25 March 2021 02:02 CET Updated version of record https://0-www-mdpi-com.brum.beds.ac.uk/2410-387X/5/1/11/pdf
article html file updated 25 March 2021 02:04 CET Update https://0-www-mdpi-com.brum.beds.ac.uk/2410-387X/5/1/11/html
Back to TopTop