Hall, R. P., Schmidt, Y., & Oliveira, F. (2025). A Comprehensive Review of Graph-Theoretic Approaches to Secure Multiparty Computation: Security Models, Optimization Techniques, and Emerging Computing Applications. Research Journal of Computer Systems and Engineering, 26–33. Retrieved from https://vit.technicaljournals.org/index.php/rjcse/article/view/130