Application of cryptography in data privacy using fuzzy graph theory
From MaRDI portal
Publication:5035143
DOI10.1080/09720529.2021.2014146zbMATH Open1483.94052OpenAlexW4200102456WikidataQ114639199 ScholiaQ114639199MaRDI QIDQ5035143FDOQ5035143
Authors: Anu Pius, D. R. Kirubaharan
Publication date: 21 February 2022
Published in: Journal of Discrete Mathematical Sciences and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1080/09720529.2021.2014146
Recommendations
- Inner magic and inner antimagic graphs in cryptography
- Structured encryption algorithm for text cryptography
- Fundamental circuits and cut-sets used in cryptography
- Hybrid symmetric cryptography approach for secure communication in web application
- Mathematical analysis and simulation of multiple keys and S-boxes in a multinode network for secure transmission
Communication theory (94A05) Cryptography (94A60) Fractional graph theory, fuzzy graph theory (05C72)
Cites Work
This page was built for publication: Application of cryptography in data privacy using fuzzy graph theory
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5035143)