Research Article

Some Graph-Based Encryption Schemes

Figure 2

Numeric representation.