Data Security Equals Graph Connectivity
From MaRDI portal
Publication:4875438
Recommendations
Cited in
(13)- Smallest bipartite bridge-connectivity augmentation
- The bridge-connectivity augmentation problem with a partition constraint
- Fast exact algorithms for survivable network design with uniform requirements
- Lower-bounding procedures for the 2-dimensional cell suppression problem
- A fast algorithm for cactus representations of minimum cuts
- Minimal invariant sets in a vertex-weighted graph
- Multigraph augmentation under biconnectivity and general edge-connectivity requirements
- Graph connectivity and its augmentation: Applications of MA orderings
- Minimum augmentation of edge-connectivity between vertices and sets of vertices in undirected graphs
- Spectral bounds for the connectivity of regular graphs with given order
- Optimal augmentation for bipartite componentwise biconnectivity in linear time
- A Graph Theoretic Approach to Statistical Data Security
- Mathematical models for applying cell suppression methodology in statistical data protection.
This page was built for publication: Data Security Equals Graph Connectivity
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4875438)