Application of cryptography in data privacy using fuzzy graph theory
From MaRDI portal
Publication:5035143
Recommendations
- Inner magic and inner antimagic graphs in cryptography
- Structured encryption algorithm for text cryptography
- Fundamental circuits and cut-sets used in cryptography
- Hybrid symmetric cryptography approach for secure communication in web application
- Mathematical analysis and simulation of multiple keys and S-boxes in a multinode network for secure transmission
Cites work
This page was built for publication: Application of cryptography in data privacy using fuzzy graph theory
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5035143)