[1]
N. Ali, M. T. . Haider, M. . Ahmad, M. Irfan, M. I. Qureshi, and H. M. A. Siddiqui, “Applications of Graph Transformations in Cryptography: A Secure Encoding Framework for Data Communication”, GIM, vol. 1, no. 1, pp. 28–43, Sep. 2025, doi: 10.64229/9917ce44.