Data Security Equals Graph Connectivity
From MaRDI portal
Publication:4875438
DOI10.1137/S0895480193243274zbMATH Open0841.68056OpenAlexW2065170767WikidataQ113434310 ScholiaQ113434310MaRDI QIDQ4875438FDOQ4875438
Authors: Ming-Yang Kao
Publication date: 2 July 1996
Published in: SIAM Journal on Discrete Mathematics (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1137/s0895480193243274
Recommendations
Foundations and philosophical topics in statistics (62A01) Connectivity (05C40) Distributed algorithms (68W15) Graph theory (05C99)
Cited In (13)
- Smallest bipartite bridge-connectivity augmentation
- Spectral Bounds for the Connectivity of Regular Graphs with Given Order
- Fast exact algorithms for survivable network design with uniform requirements
- The bridge-connectivity augmentation problem with a partition constraint
- Lower-bounding procedures for the 2-dimensional cell suppression problem
- A fast algorithm for cactus representations of minimum cuts
- Minimal invariant sets in a vertex-weighted graph
- Multigraph augmentation under biconnectivity and general edge-connectivity requirements
- Graph connectivity and its augmentation: Applications of MA orderings
- Minimum augmentation of edge-connectivity between vertices and sets of vertices in undirected graphs
- Optimal augmentation for bipartite componentwise biconnectivity in linear time
- A Graph Theoretic Approach to Statistical Data Security
- Mathematical models for applying cell suppression methodology in statistical data protection.
This page was built for publication: Data Security Equals Graph Connectivity
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4875438)