Next Article in Journal
Grid Cyber-Security Strategy in an Attacker-Defender Model
Next Article in Special Issue
Improvements on Making BKW Practical for Solving LWE
Previous Article in Journal
The Cryptographic Complexity of Anonymous Coins: A Systematic Exploration
 
 
Article

Article Versions Notes

Action Date Notes Link
article pdf uploaded. 15 March 2021 12:05 CET Version of Record https://0-www-mdpi-com.brum.beds.ac.uk/2410-387X/5/1/11/pdf-vor
article xml file uploaded 24 March 2021 05:12 CET Original file -
article xml uploaded. 24 March 2021 05:12 CET Update -
article pdf uploaded. 24 March 2021 05:12 CET Updated version of record https://0-www-mdpi-com.brum.beds.ac.uk/2410-387X/5/1/11/pdf-vor
article html file updated 24 March 2021 05:14 CET Original file -
article html file updated 24 March 2021 10:00 CET Update -
article xml file uploaded 25 March 2021 02:02 CET Update -
article xml uploaded. 25 March 2021 02:02 CET Update https://0-www-mdpi-com.brum.beds.ac.uk/2410-387X/5/1/11/xml
article pdf uploaded. 25 March 2021 02:02 CET Updated version of record https://0-www-mdpi-com.brum.beds.ac.uk/2410-387X/5/1/11/pdf
article html file updated 25 March 2021 02:04 CET Update -
article html file updated 25 July 2022 07:41 CEST Update https://0-www-mdpi-com.brum.beds.ac.uk/2410-387X/5/1/11/html
Back to TopTop