[1]
R. P. Hall, Y. Schmidt, and F. Oliveira, “A Comprehensive Review of Graph-Theoretic Approaches to Secure Multiparty Computation: Security Models, Optimization Techniques, and Emerging Computing Applications”, Res. J. Comput. Syst. Eng, pp. 26–33, Apr. 2025.