[1]
Hall, R.P. et al. 2025. A Comprehensive Review of Graph-Theoretic Approaches to Secure Multiparty Computation: Security Models, Optimization Techniques, and Emerging Computing Applications. Research Journal of Computer Systems and Engineering. (Apr. 2025), 26–33.