Return to Article Details A Graph-Based Cryptographic Framework Using Complete Graphs and Lower Triangular Identity Key Matrices Download Download PDF