(1)
Hall, R. P.; Schmidt, Y.; Oliveira, F. A Comprehensive Review of Graph-Theoretic Approaches to Secure Multiparty Computation: Security Models, Optimization Techniques, and Emerging Computing Applications. Res. J. Comput. Syst. Eng 2025, 26-33.