[1]
“Comprehensive Survey of the Cryptographic Framework for Data Security Using Graph Theory Protocol”, Int. J. Environ. Sci., pp. 2139–2149, Oct. 2025, doi: 10.64252/f4dc5043.