[1]
K. K, “Data Encryption using Graph Domination”, SHAREit, vol. 2, no. 3, pp. 27–31, Jun. 2022.