Data Security Using Crypto Bipartite Graph Theory with Modified Diffie–Hellman Algorithm

Sharing confidential information over an unprotected channel is prone to privacy breaches since unauthorized parties can steal the data. Therefore, developing a cryptosystem that ensures the security criteria for transmitted data’s secrecy, integrity, and validity is necessary and inevitable. This p...

Full description

Saved in:
Bibliographic Details
Published inWireless personal communications Vol. 139; no. 4; pp. 1905 - 1926
Main Authors Shastri, V. Harsha, Pragathi, C.
Format Journal Article
LanguageEnglish
Published New York Springer US 01.12.2024
Springer Nature B.V
Subjects
Online AccessGet full text
ISSN0929-6212
1572-834X
DOI10.1007/s11277-024-11679-y

Cover

Abstract Sharing confidential information over an unprotected channel is prone to privacy breaches since unauthorized parties can steal the data. Therefore, developing a cryptosystem that ensures the security criteria for transmitted data’s secrecy, integrity, and validity is necessary and inevitable. This paper proposes a unique graph-based crypto-system to guarantee data integrity during user-to-user communication. In the proposed work, the data is encrypted using a crypto bipartite graph theory (CBGT), which uses a creative strategy to safeguard communication by utilizing the structural characteristics of bipartite graphs. Random key selection may result in poor security and lead the CBGT to potential cryptographic attacks. In a CBGT based cryptosystem, the key is a set of edges that join the vertices belonging to the two sets. Here, improved teacher learning based optimization (iTLBO) is used to select a secure and optimized set of edges, which improves the encryption security without compromising the decryption efficiency. Moreover, a modified Diffie Hellman (m-DH) algorithm is used for key exchange. Here, Euler’s coefficient and modulo inverse are used in the private key generation to strengthen the m-DH security. Python is used to implement the simulations, and the outcomes demonstrate that the proposed method performs better than existing methods like Data Encryption Standard (DES), Advanced Encryption Standard (AES), Blowfish, and Rivest–Shamir–Adleman (RSA) in terms of encryption time, decryption time, execution time and throughput.
AbstractList Sharing confidential information over an unprotected channel is prone to privacy breaches since unauthorized parties can steal the data. Therefore, developing a cryptosystem that ensures the security criteria for transmitted data’s secrecy, integrity, and validity is necessary and inevitable. This paper proposes a unique graph-based crypto-system to guarantee data integrity during user-to-user communication. In the proposed work, the data is encrypted using a crypto bipartite graph theory (CBGT), which uses a creative strategy to safeguard communication by utilizing the structural characteristics of bipartite graphs. Random key selection may result in poor security and lead the CBGT to potential cryptographic attacks. In a CBGT based cryptosystem, the key is a set of edges that join the vertices belonging to the two sets. Here, improved teacher learning based optimization (iTLBO) is used to select a secure and optimized set of edges, which improves the encryption security without compromising the decryption efficiency. Moreover, a modified Diffie Hellman (m-DH) algorithm is used for key exchange. Here, Euler’s coefficient and modulo inverse are used in the private key generation to strengthen the m-DH security. Python is used to implement the simulations, and the outcomes demonstrate that the proposed method performs better than existing methods like Data Encryption Standard (DES), Advanced Encryption Standard (AES), Blowfish, and Rivest–Shamir–Adleman (RSA) in terms of encryption time, decryption time, execution time and throughput.
Author Shastri, V. Harsha
Pragathi, C.
Author_xml – sequence: 1
  givenname: V. Harsha
  surname: Shastri
  fullname: Shastri, V. Harsha
  email: hvaddepa@gitam.in
  organization: Department of Mathematics, School of Science, GITAM University
– sequence: 2
  givenname: C.
  surname: Pragathi
  fullname: Pragathi, C.
  organization: Department of Mathematics, School of Science, GITAM University
BookMark eNp9kL1OwzAUhS1UJErhBZgsMRv8lzgeSwstUhEDrYRYLCdxGldpEuxUKBvvwBvyJBiCxMZ07nC-c6XvFIzqpjYAXBB8RTAW154QKgTClCNCYiFRfwTGJBIUJYw_j8AYSypRTAk9Aafe7zAOmKRj8DLXnYZPJjs42_Vw4229hTPXt10Db2yrXWc7AxdOtyVcl6ZxPXyzXQkfmtwW1uRwbouQn-8fS1NVe13DabVtwla5PwPHha68Of_NCdjc3a5nS7R6XNzPpiuUUYE7pCMqkzyNDS2IMKyQnEjGaE4zzqJwGMIyIxJNiywRaaLTKCZZig1nuYwo52wCLofd1jWvB-M7tWsOrg4vFaNRnAguCQktOrQy13jvTKFaZ_fa9Ypg9e1QDQ5VcKh-HKo-QGyAfCjXW-P-pv-hvgAT1neF
Cites_doi 10.14500/aro.11007
10.1007/s11036-021-01753-1
10.1109/ACCESS.2021.3077194
10.7753/IJCATR0302.1009
10.1007/s11277-022-10102-8
10.1109/ACCESS.2021.3129224
10.1186/s13677-023-00425-7
10.2478/jaes-2023-0001
10.1016/j.cosrev.2022.100530
10.1109/MIS.2021.3131173
10.3390/sym16101269
10.1007/s11042-024-19377-4
10.1007/s11277-020-07989-6
10.1007/s40314-023-02247-4
10.1007/s10586-020-03157-4
10.1007/s11277-022-09778-9
10.1109/ACCESS.2021.3060317
10.1007/s11277-021-08266-w
10.33564/IJEAST.2021.v05i11.047
10.1007/978-3-642-04101-3_4
10.1016/j.jisa.2023.103607
10.5120/ijca2016911203
10.11591/ijece.v11i3.pp2335-2342
10.1109/ACCESS.2022.3184012
10.3390/math10142434
10.3390/s23063287
ContentType Journal Article
Copyright The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024 Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024.
Copyright_xml – notice: The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024 Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
– notice: The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024.
DBID AAYXX
CITATION
JQ2
DOI 10.1007/s11277-024-11679-y
DatabaseName CrossRef
ProQuest Computer Science Collection
DatabaseTitle CrossRef
ProQuest Computer Science Collection
DatabaseTitleList ProQuest Computer Science Collection

DeliveryMethod fulltext_linktorsrc
Discipline Journalism & Communications
Engineering
EISSN 1572-834X
EndPage 1926
ExternalDocumentID 10_1007_s11277_024_11679_y
GroupedDBID -5B
-5G
-BR
-EM
-Y2
-~C
.4S
.86
.DC
.VR
06D
0R~
0VY
123
1N0
1SB
2.D
203
28-
29R
29~
2J2
2JN
2JY
2KG
2KM
2LR
2P1
2VQ
2~H
30V
4.4
406
408
409
40D
40E
5QI
5VS
67Z
6NX
8TC
8UJ
95-
95.
95~
96X
AAAVM
AABHQ
AACDK
AAHNG
AAIAL
AAJBT
AAJKR
AANZL
AARHV
AARTL
AASML
AATNV
AATVU
AAUYE
AAWCG
AAYIU
AAYQN
AAYTO
AAYZH
ABAKF
ABBBX
ABBXA
ABDZT
ABECU
ABFTD
ABFTV
ABHLI
ABHQN
ABJNI
ABJOX
ABKCH
ABKTR
ABMNI
ABMQK
ABNWP
ABQBU
ABQSL
ABSXP
ABTEG
ABTHY
ABTKH
ABTMW
ABULA
ABWNU
ABXPI
ACAOD
ACBXY
ACDTI
ACGFS
ACHSB
ACHXU
ACKNC
ACMDZ
ACMLO
ACOKC
ACOMO
ACPIV
ACREN
ACZOJ
ADHHG
ADHIR
ADIMF
ADINQ
ADKNI
ADKPE
ADMLS
ADRFC
ADTPH
ADURQ
ADYFF
ADYOE
ADZKW
AEBTG
AEFIE
AEFQL
AEGAL
AEGNC
AEGXH
AEJHL
AEJRE
AEKMD
AEMSY
AENEX
AEOHA
AEPYU
AESKC
AETLH
AEVLU
AEXYK
AFBBN
AFEXP
AFGCZ
AFLOW
AFQWF
AFWTZ
AFYQB
AFZKB
AGAYW
AGDGC
AGGDS
AGJBK
AGMZJ
AGQEE
AGQMX
AGWIL
AGWZB
AGYKE
AHAVH
AHBYD
AHSBF
AHYZX
AIAKS
AIGIU
AIIXL
AILAN
AITGF
AJBLW
AJRNO
AJZVZ
ALMA_UNASSIGNED_HOLDINGS
ALWAN
AMKLP
AMTXH
AMXSW
AMYLF
AMYQR
AOCGG
ARCEE
ARCSS
ARMRJ
ASPBG
AVWKF
AXYYD
AYJHY
AZFZN
B-.
BA0
BBWZM
BDATZ
BGNMA
BSONS
CAG
COF
CS3
CSCUP
DDRTE
DL5
DNIVK
DPUIP
DU5
EBLON
EBS
EDO
EIOEI
EJD
ESBYG
FD6
FEDTE
FERAY
FFXSO
FIGPU
FINBP
FNLPD
FRRFC
FSGXE
FWDCC
GGCAI
GGRSB
GJIRD
GNWQR
GQ6
GQ7
GQ8
GXS
H13
HF~
HG5
HG6
HMJXF
HQYDN
HRMNR
HVGLF
HZ~
I-F
I09
IHE
IJ-
IKXTQ
ITG
ITH
ITM
IWAJR
IXC
IZIGR
IZQ
I~X
I~Z
J-C
J0Z
JBSCW
JCJTX
JZLTJ
KDC
KOV
KOW
LAK
LLZTM
M4Y
MA-
N2Q
N9A
NB0
NDZJH
NPVJJ
NQJWS
NU0
O9-
O93
O9G
O9I
O9J
OAM
OVD
P19
P9P
PF0
PT4
PT5
QOK
QOS
R4E
R89
R9I
RHV
RIG
RNI
RNS
ROL
RPX
RSV
RZC
RZE
RZK
S16
S1Z
S26
S27
S28
S3B
SAP
SCLPG
SCV
SDH
SDM
SEG
SHX
SISQX
SJYHP
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
SZN
T13
T16
TEORI
TSG
TSK
TSV
TUC
TUS
U2A
U5U
UG4
UOJIU
UTJUX
UZXMN
VC2
VFIZW
W23
W48
WK8
YLTOR
Z45
Z7R
Z7S
Z7X
Z7Z
Z81
Z83
Z88
Z8M
Z8N
Z8R
Z8T
Z8U
Z8W
Z92
ZMTXR
_50
~A9
~EX
AAPKM
AAYXX
ABBRH
ABDBE
ABFSG
ABRTQ
ACSTC
ADHKG
AEZWR
AFDZB
AFHIU
AFOHR
AGQPQ
AHPBZ
AHWEU
AIXLP
ATHPR
AYFIA
CITATION
JQ2
ID FETCH-LOGICAL-c270t-a5298db6e2f17e3f9419332d2c435332e13ce78a2fc87b8ab561cb0e43d952443
IEDL.DBID AGYKE
ISSN 0929-6212
IngestDate Mon Oct 06 18:36:28 EDT 2025
Wed Oct 01 03:57:51 EDT 2025
Fri Feb 21 02:34:49 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 4
Keywords Key selection
Data security
Cryptosystem
Key exchange
Key generation
Bipartite graph
Modified Diffie Hellman
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c270t-a5298db6e2f17e3f9419332d2c435332e13ce78a2fc87b8ab561cb0e43d952443
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
PQID 3256874911
PQPubID 2043826
PageCount 22
ParticipantIDs proquest_journals_3256874911
crossref_primary_10_1007_s11277_024_11679_y
springer_journals_10_1007_s11277_024_11679_y
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 20241200
2024-12-00
20241201
PublicationDateYYYYMMDD 2024-12-01
PublicationDate_xml – month: 12
  year: 2024
  text: 20241200
PublicationDecade 2020
PublicationPlace New York
PublicationPlace_xml – name: New York
– name: Dordrecht
PublicationSubtitle An International Journal
PublicationTitle Wireless personal communications
PublicationTitleAbbrev Wireless Pers Commun
PublicationYear 2024
Publisher Springer US
Springer Nature B.V
Publisher_xml – name: Springer US
– name: Springer Nature B.V
References 11679_CR17
SA Bokhary (11679_CR9) 2024; 16
S Rana (11679_CR26) 2023; 78
K Rama Devi (11679_CR25) 2023; 129
11679_CR15
SA Qassir (11679_CR24) 2022; 10
M Tahir (11679_CR35) 2021; 24
11679_CR31
KK Obayes (11679_CR21) 2024; 16
S Elkana Ebinazer (11679_CR11) 2021; 117
AA El-Latif (11679_CR12) 2022; 10
11679_CR7
A Aliyari Boroujeni (11679_CR5) 2023; 42
S Ullah (11679_CR37) 2023; 47
AF Shimal (11679_CR32) 2021; 11
S Swain (11679_CR34) 2021; 37
S Zaineldeen (11679_CR40) 2020; 9
MU Bokhari (11679_CR8) 2016; 147
DK Sharma (11679_CR30) 2022; 51
C Singh (11679_CR33) 2021; 12
MN Alenezi (11679_CR4) 2020; 12
HT ALRikabi (11679_CR6) 2021; 15
C Rupa (11679_CR28) 2023; 12
A Poduval (11679_CR23) 2021; 5
OF Wahab (11679_CR38) 2021; 9
A Manzoor (11679_CR18) 2022; 10
R Imam (11679_CR14) 2021; 9
11679_CR22
Z Kartit (11679_CR16) 2015
MA Abu-Faraj (11679_CR1) 2021; 21
AH Zahid (11679_CR39) 2021; 9
S Naeem (11679_CR19) 2023; 13
MA Abu-Faraj (11679_CR2) 2021; 21
MM Hazzazi (11679_CR13) 2023; 23
K Acharya (11679_CR3) 2013; 3
W Cai (11679_CR10) 2022; 127
BR Rao (11679_CR27) 2023; 29
Y Salami (11679_CR29) 2023; 16
MY Tsai (11679_CR36) 2021; 26
J Nithisha (11679_CR20) 2022; 126
References_xml – volume: 10
  start-page: 152
  issue: 2
  year: 2022
  ident: 11679_CR24
  publication-title: ARO—The Scientific Journal of Koya University
  doi: 10.14500/aro.11007
– volume: 26
  start-page: 1386
  issue: 3
  year: 2021
  ident: 11679_CR36
  publication-title: Mobile Networks and Applications
  doi: 10.1007/s11036-021-01753-1
– volume: 12
  start-page: 819
  issue: 1
  year: 2021
  ident: 11679_CR33
  publication-title: Turkish Journal of Computer and Mathematics Education (TURCOMAT)
– volume: 9
  start-page: 67797
  year: 2021
  ident: 11679_CR39
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2021.3077194
– volume: 3
  start-page: 130
  issue: 2
  year: 2013
  ident: 11679_CR3
  publication-title: International Journal of Computer Applications Technology and Research
  doi: 10.7753/IJCATR0302.1009
– volume: 129
  start-page: 387
  issue: 1
  year: 2023
  ident: 11679_CR25
  publication-title: Wireless Personal Communications
  doi: 10.1007/s11277-022-10102-8
– volume: 9
  start-page: 155949
  year: 2021
  ident: 11679_CR14
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2021.3129224
– volume: 12
  start-page: 47
  issue: 1
  year: 2023
  ident: 11679_CR28
  publication-title: Journal of Cloud Computing
  doi: 10.1186/s13677-023-00425-7
– ident: 11679_CR15
– volume: 13
  start-page: 1
  issue: 1
  year: 2023
  ident: 11679_CR19
  publication-title: Journal of Applied and Emerging Sciences
  doi: 10.2478/jaes-2023-0001
– volume: 47
  year: 2023
  ident: 11679_CR37
  publication-title: Computer Science Review
  doi: 10.1016/j.cosrev.2022.100530
– volume: 15
  start-page: 145
  issue: 16
  year: 2021
  ident: 11679_CR6
  publication-title: iJIM
– ident: 11679_CR17
– volume: 37
  start-page: 59
  issue: 5
  year: 2021
  ident: 11679_CR34
  publication-title: IEEE Intelligent Systems
  doi: 10.1109/MIS.2021.3131173
– volume: 9
  start-page: 211
  issue: 3
  year: 2020
  ident: 11679_CR40
  publication-title: Int. J. Comput. Sci. Mobile Comput.
– volume: 16
  start-page: 1269
  issue: 10
  year: 2024
  ident: 11679_CR9
  publication-title: Symmetry.
  doi: 10.3390/sym16101269
– volume: 51
  start-page: 104
  year: 2022
  ident: 11679_CR30
  publication-title: Materials Today: Proceedings
– volume: 21
  start-page: 648
  issue: 12
  year: 2021
  ident: 11679_CR1
  publication-title: International Journal of Computer Science & Network Security
– ident: 11679_CR31
  doi: 10.1007/s11042-024-19377-4
– volume: 117
  start-page: 3309
  issue: 4
  year: 2021
  ident: 11679_CR11
  publication-title: Wireless Personal Communications
  doi: 10.1007/s11277-020-07989-6
– volume: 16
  start-page: 26
  issue: 3
  year: 2024
  ident: 11679_CR21
  publication-title: Journal of Al-Qadisiyah for Computer Science and Mathematics.
– volume: 42
  start-page: 99
  issue: 2
  year: 2023
  ident: 11679_CR5
  publication-title: Computational and Applied Mathematics.
  doi: 10.1007/s40314-023-02247-4
– volume: 11
  start-page: 3996
  issue: 5
  year: 2021
  ident: 11679_CR32
  publication-title: International Journal of Electrical and Computer Engineering
– volume: 24
  start-page: 739
  issue: 2
  year: 2021
  ident: 11679_CR35
  publication-title: Cluster Computing
  doi: 10.1007/s10586-020-03157-4
– volume: 126
  start-page: 1
  year: 2022
  ident: 11679_CR20
  publication-title: Wireless Personal Communications
  doi: 10.1007/s11277-022-09778-9
– volume: 9
  start-page: 31805
  year: 2021
  ident: 11679_CR38
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2021.3060317
– volume: 127
  start-page: 341
  issue: 1
  year: 2022
  ident: 11679_CR10
  publication-title: Wireless Personal Communications
  doi: 10.1007/s11277-021-08266-w
– volume: 5
  start-page: 284
  issue: 11
  year: 2021
  ident: 11679_CR23
  publication-title: International Journal of Engineering Applied Sciences and Technology.
  doi: 10.33564/IJEAST.2021.v05i11.047
– volume: 21
  start-page: 53
  issue: 12
  year: 2021
  ident: 11679_CR2
  publication-title: International Journal of Computer Science & Network Security.
– ident: 11679_CR22
  doi: 10.1007/978-3-642-04101-3_4
– volume: 78
  year: 2023
  ident: 11679_CR26
  publication-title: Journal of Information Security and Applications
  doi: 10.1016/j.jisa.2023.103607
– start-page: 141
  volume-title: International Symposium on Ubiquitous Networking
  year: 2015
  ident: 11679_CR16
– volume: 12
  start-page: 256
  issue: 2
  year: 2020
  ident: 11679_CR4
  publication-title: International Journal of Communication Networks and Information Security.
– volume: 16
  start-page: 46
  issue: 2
  year: 2023
  ident: 11679_CR29
  publication-title: J. Comput. Robot.
– volume: 147
  start-page: 43
  issue: 10
  year: 2016
  ident: 11679_CR8
  publication-title: International Journal of Computer Applications
  doi: 10.5120/ijca2016911203
– ident: 11679_CR7
  doi: 10.11591/ijece.v11i3.pp2335-2342
– volume: 10
  start-page: 74164
  year: 2022
  ident: 11679_CR18
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2022.3184012
– volume: 10
  start-page: 2434
  issue: 14
  year: 2022
  ident: 11679_CR12
  publication-title: Mathematics
  doi: 10.3390/math10142434
– volume: 23
  start-page: 3287
  issue: 6
  year: 2023
  ident: 11679_CR13
  publication-title: Sensors
  doi: 10.3390/s23063287
– volume: 29
  year: 2023
  ident: 11679_CR27
  publication-title: Measurement: Sensors
SSID ssj0010092
Score 2.3574908
Snippet Sharing confidential information over an unprotected channel is prone to privacy breaches since unauthorized parties can steal the data. Therefore, developing...
SourceID proquest
crossref
springer
SourceType Aggregation Database
Index Database
Publisher
StartPage 1905
SubjectTerms Access control
Algorithms
Apexes
Communication channels
Communications Engineering
Computer Communication Networks
Cryptography
Data encryption
Data integrity
Digital currencies
Edge joints
Encryption
Engineering
Graph theory
Integrity
Networks
Privacy
Secrecy aspects
Security
Signal,Image and Speech Processing
Wavelet transforms
Title Data Security Using Crypto Bipartite Graph Theory with Modified Diffie–Hellman Algorithm
URI https://link.springer.com/article/10.1007/s11277-024-11679-y
https://www.proquest.com/docview/3256874911
Volume 139
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVLSH
  databaseName: SpringerLink Journals
  customDbUrl:
  mediaType: online
  eissn: 1572-834X
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0010092
  issn: 0929-6212
  databaseCode: AFBBN
  dateStart: 19970101
  isFulltext: true
  providerName: Library Specific Holdings
– providerCode: PRVAVX
  databaseName: SpringerLINK - Czech Republic Consortium
  customDbUrl:
  eissn: 1572-834X
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0010092
  issn: 0929-6212
  databaseCode: AGYKE
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: http://link.springer.com
  providerName: Springer Nature
– providerCode: PRVAVX
  databaseName: SpringerLink Journals (ICM)
  customDbUrl:
  eissn: 1572-834X
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0010092
  issn: 0929-6212
  databaseCode: U2A
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: http://www.springerlink.com/journals/
  providerName: Springer Nature
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3NTsJAEJ4oXvTgvxFBsgfjRUva3ULbI6hoNHBREvXS7HZ3lQiUSD3gyXfwDX0SZ0sravTArUk3k3ZmOvN1Z-ZbgANb11g9iFyLSY9brsNti3ummcrR2mYycHxt9iHbnfpF1728rd1mQ2HjvNs9L0mmkXo27OaYciPmFCutHViTRVhK-bYKsNQ4v7s6-6oeGCKhlGPPtHZgbM6GZf6W8jMhzVDmr8Jomm9aa9DNn3TaZvJUfUlENXr9ReI476usw2oGQElj6jEbsKCGm7DyjZZwE0rZot54QA7JjxGS8Rbcn_KEk-vs3DuS9hyQk-fJKIlJszcyrpgocm6IsMl08p-YzV7SjmVPI-Alp2abSH28vWPK6w_4kDT6DzHKehxsQ7d1dnNyYWUnNFgR9ezE4jUa-FLUFdWOp5gOXMSDjEoaIQrDC-WwSHk-pzryPeFzgWgtErZy0QtqCCzYDhSG8VDtAqHSQ8_QAY9c7XKMo7YUQmsWCPyFlUIW4Sg3UziaEnGEM8plo88Q9Rmm-gwnRSjnlgyzj3IcMoR3vudieC_CcW6Y2e3_pe3Nt7wEyzS1rWl6KUMheX5R-whdElFBT201m51K5rEVWOzSxidfluja
linkProvider Springer Nature
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV29TsMwED5BGYABQQFRWsADYoFIiZ00yVhaoEDbhVZCLJEd21CJ_oiGoRvvwBvyJJzThFIEA1ukWDfcXe6-3M9ngGNbe6waxq7FpM8t1-G2xX0zTOVobTMZOoE2dch2p9rsuTf33n22FDbJp93zlmQaqefLbo5pN2JOsdLegTVdhhVDYGUY83u09tU7MDRCKcOeGezAyJytyvwuYzEdzTHmj7Zomm0uN2Ejg4mkNrPrFiypYRHWv5EHFqGcHepPBuSELCx6TLbhocETTu6y2-lIOhlA6i_TcTIi5_2xcZhEkStDV01m-_nElGRJeyT7GmEpaZhijvp4e8fE9DzgQ1J7fhyhrKfBDvQuL7r1ppXdo2DF1LcTi3s0DKSoKqodXzEduojaGJU0RqyED8phsfIDTnUc-CLgAjFVLGzloq08TP9sFwrD0VDtAaHSR_vpkMeudjlGO1sKoTULBf5oSiFLcJqrMxrP6DKiOTGyUX6Eyo9S5UfTElRyjUfZpzOJGIKwwHcxCJfgLLfC_PXf0vb_d_wIVpvdditqXXduy7BGU6cwYyoVKCQvr-oAwUYiDlPf-gTHM8wT
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV07T8MwED5BkRAMiKco5eEBsUDUxHabZCyUUp5CgkoVS2THNlSiaUXD0I3_wD_kl3BOU0oRDGyRYt1wd7n7co_PAPuuqbBqGHOHKV843BOuI3w7TOUZ4zIVeoGxdcjrm2qzxS_alfa3Lf5s2n3ckhztNFiWpiQt95UpTxbfPNt6xPziZH0EZzgLc9wSJaBHt2jtq49gKYUytj075IFROl-b-V3GdGqa4M0fLdIs8zSWYSmHjKQ2svEKzOhkFRa_EQmuQik_1Bl0yQGZWvoYrMFDXaSC3OU31ZFsSoCcvAz7aY8cd_rWeVJNzix1NRnt6hNbniXXPdUxCFFJ3RZ29MfbOyap565ISO35sYeynrrr0Gqc3p80nfxOBSemvps6okLDQMmqpsbzNTMhRwTHqKIx4iZ80B6LtR8IauLAl4GQiK9i6WqOdqsgFGAbUEh6id4EQpWPtjShiLnhAiOfq6Q0hoUSfzqVVEU4HKsz6o-oM6IJSbJVfoTKjzLlR8MibI81HuWf0SBiCMgCn2NALsLR2AqT139L2_rf8T2Yv603oqvzm8sSLNDMJ-zEyjYU0pdXvYO4I5W7mWt9Aqm_0E8
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Data+Security+Using+Crypto+Bipartite+Graph+Theory+with+Modified+Diffie%E2%80%93Hellman+Algorithm&rft.jtitle=Wireless+personal+communications&rft.au=Shastri%2C+V.+Harsha&rft.au=Pragathi%2C+C&rft.date=2024-12-01&rft.pub=Springer+Nature+B.V&rft.issn=0929-6212&rft.eissn=1572-834X&rft.volume=139&rft.issue=4&rft.spage=1905&rft.epage=1926&rft_id=info:doi/10.1007%2Fs11277-024-11679-y&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0929-6212&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0929-6212&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0929-6212&client=summon