Hall, R. P., Schmidt, Y. and Oliveira, F. (2025) “A Comprehensive Review of Graph-Theoretic Approaches to Secure Multiparty Computation: Security Models, Optimization Techniques, and Emerging Computing Applications”, Research Journal of Computer Systems and Engineering, pp. 26–33. Available at: https://vit.technicaljournals.org/index.php/rjcse/article/view/130 (Accessed: 19 May 2026).