1.
Hall RP, Schmidt Y, Oliveira F. A Comprehensive Review of Graph-Theoretic Approaches to Secure Multiparty Computation: Security Models, Optimization Techniques, and Emerging Computing Applications. Res. J. Comput. Syst. Eng [Internet]. 2025 Apr. 20 [cited 2026 May 19];:26-33. Available from: https://vit.technicaljournals.org/index.php/rjcse/article/view/130