dc.contributor.author | Meenakshi, Annamalai | |
dc.contributor.author | Kannan, Adhimoolam | |
dc.contributor.author | Čep, Robert | |
dc.contributor.author | Elangovan, Muniyandy | |
dc.date.accessioned | 2024-04-19T09:26:54Z | |
dc.date.available | 2024-04-19T09:26:54Z | |
dc.date.issued | 2023 | |
dc.identifier.citation | Mathematics. 2023, vol. 11, issue 19, art. no. 4132. | cs |
dc.identifier.issn | 2227-7390 | |
dc.identifier.uri | http://hdl.handle.net/10084/152545 | |
dc.description.abstract | Cryptography is a pivotal application of graph theory in ensuring secure communication
systems. Modern cryptography is deeply rooted in mathematical theory and computer science
practices. It is widely recognized that encryption and decryption processes are primarily outcomes
of mathematical research. Given the increasing importance of safeguarding secret information or
messages from potential intruders, it is imperative to develop effective technical tools for this purpose.
These intruders are often well-versed in the latest technological advancements that could breach
security. To address this, our study focuses on the efficacious combinatorial technique of graph
networks using efficient domination and total magic labeling. The introduction of a graph network
based on total magic labeling can significantly influence the network’s performance. This research
introduces a novel combinatorial method for encrypting and decrypting confidential numbers by
leveraging an efficient dominant notion and labeled graph. | cs |
dc.language.iso | en | cs |
dc.publisher | MDPI | cs |
dc.relation.ispartofseries | Mathematics | cs |
dc.relation.uri | https://doi.org/10.3390/math11194132 | cs |
dc.rights | © 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license. | cs |
dc.rights.uri | http://creativecommons.org/licenses/by/4.0/ | cs |
dc.subject | labeled graph | cs |
dc.subject | network | cs |
dc.subject | magic labeling | cs |
dc.subject | efficient domination | cs |
dc.subject | encryption | cs |
dc.subject | decryption | cs |
dc.title | Efficient graph network using total magic labeling and its applications | cs |
dc.type | article | cs |
dc.identifier.doi | 10.3390/math11194132 | |
dc.rights.access | openAccess | cs |
dc.type.version | publishedVersion | cs |
dc.type.status | Peer-reviewed | cs |
dc.description.source | Web of Science | cs |
dc.description.volume | 11 | cs |
dc.description.issue | 19 | cs |
dc.description.firstpage | art. no. 4132 | cs |
dc.identifier.wos | 001094702500001 | |