Hall, R. P., et al. “A Comprehensive Review of Graph-Theoretic Approaches to Secure Multiparty Computation: Security Models, Optimization Techniques, and Emerging Computing Applications”. Research Journal of Computer Systems and Engineering, Apr. 2025, pp. 26-33, https://vit.technicaljournals.org/index.php/rjcse/article/view/130.