Login / Signup
On Secure Domination in Graphs.
Houcine Boumediene Merouane
Mustapha Chellali
Published in:
Inf. Process. Lett. (2015)
Keyphrases
</>
graph matching
sensitive data
graph mining
random graphs
graph theoretic
pattern recognition
security issues
graph data
labeled graphs
key exchange
graph construction
graph clustering
key management
multi party
complex structures
graph model
graph theory
peer to peer