Next Article in Journal
The Cryptographic Complexity of Anonymous Coins: A Systematic Exploration
Next Article in Special Issue
Grid Cyber-Security Strategy in an Attacker-Defender Model
Previous Article in Journal
TRNGs from Pre-Formed ReRAM Arrays
Previous Article in Special Issue
Electromagnetic and Power Side-Channel Analysis: Advanced Attacks and Low-Overhead Generic Countermeasures through White-Box Approach
 
 
Article

Article Versions Notes

Action Date Notes Link
article xml file uploaded 1 March 2021 05:49 CET Original file -
article xml uploaded. 1 March 2021 05:49 CET Update -
article pdf uploaded. 1 March 2021 05:49 CET Version of Record https://0-www-mdpi-com.brum.beds.ac.uk/2410-387X/5/1/9/pdf-vor
article html file updated 1 March 2021 05:51 CET Original file -
article xml file uploaded 18 March 2021 08:59 CET Update -
article xml uploaded. 18 March 2021 08:59 CET Update -
article pdf uploaded. 18 March 2021 08:59 CET Updated version of record https://0-www-mdpi-com.brum.beds.ac.uk/2410-387X/5/1/9/pdf-vor
article html file updated 18 March 2021 10:09 CET Update -
article xml file uploaded 18 March 2021 10:30 CET Update -
article xml uploaded. 18 March 2021 10:30 CET Update https://0-www-mdpi-com.brum.beds.ac.uk/2410-387X/5/1/9/xml
article pdf uploaded. 18 March 2021 10:30 CET Updated version of record https://0-www-mdpi-com.brum.beds.ac.uk/2410-387X/5/1/9/pdf
article html file updated 18 March 2021 10:49 CET Update -
article html file updated 25 July 2022 05:34 CEST Update https://0-www-mdpi-com.brum.beds.ac.uk/2410-387X/5/1/9/html
Back to TopTop