Login / Signup
Secure domination and secure total domination in graphs.
William Klostermeyer
Christina M. Mynhardt
Published in:
Discuss. Math. Graph Theory (2008)
Keyphrases
</>
database
lightweight
security issues
group communication
clustering algorithm
directed graph
graph structure
security analysis
user authentication
security level
cryptographic protocols
security management
scalar product