[1]
Maimoona Safdar, “A Graph-Based Cryptographic Framework Using Complete Graphs and Lower Triangular Identity Key Matrices”, GIM, vol. 1, no. 1, pp. 66–83, Sep. 2025, doi: 10.64229/9m8mm690.