Return to Article Details A Comprehensive Review of Graph-Theoretic Approaches to Secure Multiparty Computation: Security Models, Optimization Techniques, and Emerging Computing Applications Download Download PDF