Research Article

Some Graph-Based Encryption Schemes

Figure 8