Login / Signup
A Comparison of Four Notions of Isomorphism-Based Security for Graphs.
Zhiyuan Lin
Mahesh Tripunitara
Published in:
IEEE Trans. Dependable Secur. Comput. (2023)
Keyphrases
</>
graph theory
graph isomorphism
graph search
security issues
subgraph isomorphism
security requirements
intrusion detection
access control
key management
privacy preserving
bipartite graph
security policies
graph databases
database
network security
security problems
security threats
security management