Research Article

Some Graph-Based Encryption Schemes

Figure 1

Schematic diagram.