Data Security Using Crypto Bipartite Graph Theory with Modified Diffie–Hellman Algorithm
Sharing confidential information over an unprotected channel is prone to privacy breaches since unauthorized parties can steal the data. Therefore, developing a cryptosystem that ensures the security criteria for transmitted data’s secrecy, integrity, and validity is necessary and inevitable. This p...
Saved in:
| Published in | Wireless personal communications Vol. 139; no. 4; pp. 1905 - 1926 |
|---|---|
| Main Authors | , |
| Format | Journal Article |
| Language | English |
| Published |
New York
Springer US
01.12.2024
Springer Nature B.V |
| Subjects | |
| Online Access | Get full text |
| ISSN | 0929-6212 1572-834X |
| DOI | 10.1007/s11277-024-11679-y |
Cover
| Abstract | Sharing confidential information over an unprotected channel is prone to privacy breaches since unauthorized parties can steal the data. Therefore, developing a cryptosystem that ensures the security criteria for transmitted data’s secrecy, integrity, and validity is necessary and inevitable. This paper proposes a unique graph-based crypto-system to guarantee data integrity during user-to-user communication. In the proposed work, the data is encrypted using a crypto bipartite graph theory (CBGT), which uses a creative strategy to safeguard communication by utilizing the structural characteristics of bipartite graphs. Random key selection may result in poor security and lead the CBGT to potential cryptographic attacks. In a CBGT based cryptosystem, the key is a set of edges that join the vertices belonging to the two sets. Here, improved teacher learning based optimization (iTLBO) is used to select a secure and optimized set of edges, which improves the encryption security without compromising the decryption efficiency. Moreover, a modified Diffie Hellman (m-DH) algorithm is used for key exchange. Here, Euler’s coefficient and modulo inverse are used in the private key generation to strengthen the m-DH security. Python is used to implement the simulations, and the outcomes demonstrate that the proposed method performs better than existing methods like Data Encryption Standard (DES), Advanced Encryption Standard (AES), Blowfish, and Rivest–Shamir–Adleman (RSA) in terms of encryption time, decryption time, execution time and throughput. |
|---|---|
| AbstractList | Sharing confidential information over an unprotected channel is prone to privacy breaches since unauthorized parties can steal the data. Therefore, developing a cryptosystem that ensures the security criteria for transmitted data’s secrecy, integrity, and validity is necessary and inevitable. This paper proposes a unique graph-based crypto-system to guarantee data integrity during user-to-user communication. In the proposed work, the data is encrypted using a crypto bipartite graph theory (CBGT), which uses a creative strategy to safeguard communication by utilizing the structural characteristics of bipartite graphs. Random key selection may result in poor security and lead the CBGT to potential cryptographic attacks. In a CBGT based cryptosystem, the key is a set of edges that join the vertices belonging to the two sets. Here, improved teacher learning based optimization (iTLBO) is used to select a secure and optimized set of edges, which improves the encryption security without compromising the decryption efficiency. Moreover, a modified Diffie Hellman (m-DH) algorithm is used for key exchange. Here, Euler’s coefficient and modulo inverse are used in the private key generation to strengthen the m-DH security. Python is used to implement the simulations, and the outcomes demonstrate that the proposed method performs better than existing methods like Data Encryption Standard (DES), Advanced Encryption Standard (AES), Blowfish, and Rivest–Shamir–Adleman (RSA) in terms of encryption time, decryption time, execution time and throughput. |
| Author | Shastri, V. Harsha Pragathi, C. |
| Author_xml | – sequence: 1 givenname: V. Harsha surname: Shastri fullname: Shastri, V. Harsha email: hvaddepa@gitam.in organization: Department of Mathematics, School of Science, GITAM University – sequence: 2 givenname: C. surname: Pragathi fullname: Pragathi, C. organization: Department of Mathematics, School of Science, GITAM University |
| BookMark | eNp9kL1OwzAUhS1UJErhBZgsMRv8lzgeSwstUhEDrYRYLCdxGldpEuxUKBvvwBvyJBiCxMZ07nC-c6XvFIzqpjYAXBB8RTAW154QKgTClCNCYiFRfwTGJBIUJYw_j8AYSypRTAk9Aafe7zAOmKRj8DLXnYZPJjs42_Vw4229hTPXt10Db2yrXWc7AxdOtyVcl6ZxPXyzXQkfmtwW1uRwbouQn-8fS1NVe13DabVtwla5PwPHha68Of_NCdjc3a5nS7R6XNzPpiuUUYE7pCMqkzyNDS2IMKyQnEjGaE4zzqJwGMIyIxJNiywRaaLTKCZZig1nuYwo52wCLofd1jWvB-M7tWsOrg4vFaNRnAguCQktOrQy13jvTKFaZ_fa9Ypg9e1QDQ5VcKh-HKo-QGyAfCjXW-P-pv-hvgAT1neF |
| Cites_doi | 10.14500/aro.11007 10.1007/s11036-021-01753-1 10.1109/ACCESS.2021.3077194 10.7753/IJCATR0302.1009 10.1007/s11277-022-10102-8 10.1109/ACCESS.2021.3129224 10.1186/s13677-023-00425-7 10.2478/jaes-2023-0001 10.1016/j.cosrev.2022.100530 10.1109/MIS.2021.3131173 10.3390/sym16101269 10.1007/s11042-024-19377-4 10.1007/s11277-020-07989-6 10.1007/s40314-023-02247-4 10.1007/s10586-020-03157-4 10.1007/s11277-022-09778-9 10.1109/ACCESS.2021.3060317 10.1007/s11277-021-08266-w 10.33564/IJEAST.2021.v05i11.047 10.1007/978-3-642-04101-3_4 10.1016/j.jisa.2023.103607 10.5120/ijca2016911203 10.11591/ijece.v11i3.pp2335-2342 10.1109/ACCESS.2022.3184012 10.3390/math10142434 10.3390/s23063287 |
| ContentType | Journal Article |
| Copyright | The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024 Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law. The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024. |
| Copyright_xml | – notice: The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024 Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law. – notice: The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024. |
| DBID | AAYXX CITATION JQ2 |
| DOI | 10.1007/s11277-024-11679-y |
| DatabaseName | CrossRef ProQuest Computer Science Collection |
| DatabaseTitle | CrossRef ProQuest Computer Science Collection |
| DatabaseTitleList | ProQuest Computer Science Collection |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Journalism & Communications Engineering |
| EISSN | 1572-834X |
| EndPage | 1926 |
| ExternalDocumentID | 10_1007_s11277_024_11679_y |
| GroupedDBID | -5B -5G -BR -EM -Y2 -~C .4S .86 .DC .VR 06D 0R~ 0VY 123 1N0 1SB 2.D 203 28- 29R 29~ 2J2 2JN 2JY 2KG 2KM 2LR 2P1 2VQ 2~H 30V 4.4 406 408 409 40D 40E 5QI 5VS 67Z 6NX 8TC 8UJ 95- 95. 95~ 96X AAAVM AABHQ AACDK AAHNG AAIAL AAJBT AAJKR AANZL AARHV AARTL AASML AATNV AATVU AAUYE AAWCG AAYIU AAYQN AAYTO AAYZH ABAKF ABBBX ABBXA ABDZT ABECU ABFTD ABFTV ABHLI ABHQN ABJNI ABJOX ABKCH ABKTR ABMNI ABMQK ABNWP ABQBU ABQSL ABSXP ABTEG ABTHY ABTKH ABTMW ABULA ABWNU ABXPI ACAOD ACBXY ACDTI ACGFS ACHSB ACHXU ACKNC ACMDZ ACMLO ACOKC ACOMO ACPIV ACREN ACZOJ ADHHG ADHIR ADIMF ADINQ ADKNI ADKPE ADMLS ADRFC ADTPH ADURQ ADYFF ADYOE ADZKW AEBTG AEFIE AEFQL AEGAL AEGNC AEGXH AEJHL AEJRE AEKMD AEMSY AENEX AEOHA AEPYU AESKC AETLH AEVLU AEXYK AFBBN AFEXP AFGCZ AFLOW AFQWF AFWTZ AFYQB AFZKB AGAYW AGDGC AGGDS AGJBK AGMZJ AGQEE AGQMX AGWIL AGWZB AGYKE AHAVH AHBYD AHSBF AHYZX AIAKS AIGIU AIIXL AILAN AITGF AJBLW AJRNO AJZVZ ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMTXH AMXSW AMYLF AMYQR AOCGG ARCEE ARCSS ARMRJ ASPBG AVWKF AXYYD AYJHY AZFZN B-. BA0 BBWZM BDATZ BGNMA BSONS CAG COF CS3 CSCUP DDRTE DL5 DNIVK DPUIP DU5 EBLON EBS EDO EIOEI EJD ESBYG FD6 FEDTE FERAY FFXSO FIGPU FINBP FNLPD FRRFC FSGXE FWDCC GGCAI GGRSB GJIRD GNWQR GQ6 GQ7 GQ8 GXS H13 HF~ HG5 HG6 HMJXF HQYDN HRMNR HVGLF HZ~ I-F I09 IHE IJ- IKXTQ ITG ITH ITM IWAJR IXC IZIGR IZQ I~X I~Z J-C J0Z JBSCW JCJTX JZLTJ KDC KOV KOW LAK LLZTM M4Y MA- N2Q N9A NB0 NDZJH NPVJJ NQJWS NU0 O9- O93 O9G O9I O9J OAM OVD P19 P9P PF0 PT4 PT5 QOK QOS R4E R89 R9I RHV RIG RNI RNS ROL RPX RSV RZC RZE RZK S16 S1Z S26 S27 S28 S3B SAP SCLPG SCV SDH SDM SEG SHX SISQX SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 T16 TEORI TSG TSK TSV TUC TUS U2A U5U UG4 UOJIU UTJUX UZXMN VC2 VFIZW W23 W48 WK8 YLTOR Z45 Z7R Z7S Z7X Z7Z Z81 Z83 Z88 Z8M Z8N Z8R Z8T Z8U Z8W Z92 ZMTXR _50 ~A9 ~EX AAPKM AAYXX ABBRH ABDBE ABFSG ABRTQ ACSTC ADHKG AEZWR AFDZB AFHIU AFOHR AGQPQ AHPBZ AHWEU AIXLP ATHPR AYFIA CITATION JQ2 |
| ID | FETCH-LOGICAL-c270t-a5298db6e2f17e3f9419332d2c435332e13ce78a2fc87b8ab561cb0e43d952443 |
| IEDL.DBID | AGYKE |
| ISSN | 0929-6212 |
| IngestDate | Mon Oct 06 18:36:28 EDT 2025 Wed Oct 01 03:57:51 EDT 2025 Fri Feb 21 02:34:49 EST 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 4 |
| Keywords | Key selection Data security Cryptosystem Key exchange Key generation Bipartite graph Modified Diffie Hellman |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c270t-a5298db6e2f17e3f9419332d2c435332e13ce78a2fc87b8ab561cb0e43d952443 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| PQID | 3256874911 |
| PQPubID | 2043826 |
| PageCount | 22 |
| ParticipantIDs | proquest_journals_3256874911 crossref_primary_10_1007_s11277_024_11679_y springer_journals_10_1007_s11277_024_11679_y |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 20241200 2024-12-00 20241201 |
| PublicationDateYYYYMMDD | 2024-12-01 |
| PublicationDate_xml | – month: 12 year: 2024 text: 20241200 |
| PublicationDecade | 2020 |
| PublicationPlace | New York |
| PublicationPlace_xml | – name: New York – name: Dordrecht |
| PublicationSubtitle | An International Journal |
| PublicationTitle | Wireless personal communications |
| PublicationTitleAbbrev | Wireless Pers Commun |
| PublicationYear | 2024 |
| Publisher | Springer US Springer Nature B.V |
| Publisher_xml | – name: Springer US – name: Springer Nature B.V |
| References | 11679_CR17 SA Bokhary (11679_CR9) 2024; 16 S Rana (11679_CR26) 2023; 78 K Rama Devi (11679_CR25) 2023; 129 11679_CR15 SA Qassir (11679_CR24) 2022; 10 M Tahir (11679_CR35) 2021; 24 11679_CR31 KK Obayes (11679_CR21) 2024; 16 S Elkana Ebinazer (11679_CR11) 2021; 117 AA El-Latif (11679_CR12) 2022; 10 11679_CR7 A Aliyari Boroujeni (11679_CR5) 2023; 42 S Ullah (11679_CR37) 2023; 47 AF Shimal (11679_CR32) 2021; 11 S Swain (11679_CR34) 2021; 37 S Zaineldeen (11679_CR40) 2020; 9 MU Bokhari (11679_CR8) 2016; 147 DK Sharma (11679_CR30) 2022; 51 C Singh (11679_CR33) 2021; 12 MN Alenezi (11679_CR4) 2020; 12 HT ALRikabi (11679_CR6) 2021; 15 C Rupa (11679_CR28) 2023; 12 A Poduval (11679_CR23) 2021; 5 OF Wahab (11679_CR38) 2021; 9 A Manzoor (11679_CR18) 2022; 10 R Imam (11679_CR14) 2021; 9 11679_CR22 Z Kartit (11679_CR16) 2015 MA Abu-Faraj (11679_CR1) 2021; 21 AH Zahid (11679_CR39) 2021; 9 S Naeem (11679_CR19) 2023; 13 MA Abu-Faraj (11679_CR2) 2021; 21 MM Hazzazi (11679_CR13) 2023; 23 K Acharya (11679_CR3) 2013; 3 W Cai (11679_CR10) 2022; 127 BR Rao (11679_CR27) 2023; 29 Y Salami (11679_CR29) 2023; 16 MY Tsai (11679_CR36) 2021; 26 J Nithisha (11679_CR20) 2022; 126 |
| References_xml | – volume: 10 start-page: 152 issue: 2 year: 2022 ident: 11679_CR24 publication-title: ARO—The Scientific Journal of Koya University doi: 10.14500/aro.11007 – volume: 26 start-page: 1386 issue: 3 year: 2021 ident: 11679_CR36 publication-title: Mobile Networks and Applications doi: 10.1007/s11036-021-01753-1 – volume: 12 start-page: 819 issue: 1 year: 2021 ident: 11679_CR33 publication-title: Turkish Journal of Computer and Mathematics Education (TURCOMAT) – volume: 9 start-page: 67797 year: 2021 ident: 11679_CR39 publication-title: IEEE Access doi: 10.1109/ACCESS.2021.3077194 – volume: 3 start-page: 130 issue: 2 year: 2013 ident: 11679_CR3 publication-title: International Journal of Computer Applications Technology and Research doi: 10.7753/IJCATR0302.1009 – volume: 129 start-page: 387 issue: 1 year: 2023 ident: 11679_CR25 publication-title: Wireless Personal Communications doi: 10.1007/s11277-022-10102-8 – volume: 9 start-page: 155949 year: 2021 ident: 11679_CR14 publication-title: IEEE Access doi: 10.1109/ACCESS.2021.3129224 – volume: 12 start-page: 47 issue: 1 year: 2023 ident: 11679_CR28 publication-title: Journal of Cloud Computing doi: 10.1186/s13677-023-00425-7 – ident: 11679_CR15 – volume: 13 start-page: 1 issue: 1 year: 2023 ident: 11679_CR19 publication-title: Journal of Applied and Emerging Sciences doi: 10.2478/jaes-2023-0001 – volume: 47 year: 2023 ident: 11679_CR37 publication-title: Computer Science Review doi: 10.1016/j.cosrev.2022.100530 – volume: 15 start-page: 145 issue: 16 year: 2021 ident: 11679_CR6 publication-title: iJIM – ident: 11679_CR17 – volume: 37 start-page: 59 issue: 5 year: 2021 ident: 11679_CR34 publication-title: IEEE Intelligent Systems doi: 10.1109/MIS.2021.3131173 – volume: 9 start-page: 211 issue: 3 year: 2020 ident: 11679_CR40 publication-title: Int. J. Comput. Sci. Mobile Comput. – volume: 16 start-page: 1269 issue: 10 year: 2024 ident: 11679_CR9 publication-title: Symmetry. doi: 10.3390/sym16101269 – volume: 51 start-page: 104 year: 2022 ident: 11679_CR30 publication-title: Materials Today: Proceedings – volume: 21 start-page: 648 issue: 12 year: 2021 ident: 11679_CR1 publication-title: International Journal of Computer Science & Network Security – ident: 11679_CR31 doi: 10.1007/s11042-024-19377-4 – volume: 117 start-page: 3309 issue: 4 year: 2021 ident: 11679_CR11 publication-title: Wireless Personal Communications doi: 10.1007/s11277-020-07989-6 – volume: 16 start-page: 26 issue: 3 year: 2024 ident: 11679_CR21 publication-title: Journal of Al-Qadisiyah for Computer Science and Mathematics. – volume: 42 start-page: 99 issue: 2 year: 2023 ident: 11679_CR5 publication-title: Computational and Applied Mathematics. doi: 10.1007/s40314-023-02247-4 – volume: 11 start-page: 3996 issue: 5 year: 2021 ident: 11679_CR32 publication-title: International Journal of Electrical and Computer Engineering – volume: 24 start-page: 739 issue: 2 year: 2021 ident: 11679_CR35 publication-title: Cluster Computing doi: 10.1007/s10586-020-03157-4 – volume: 126 start-page: 1 year: 2022 ident: 11679_CR20 publication-title: Wireless Personal Communications doi: 10.1007/s11277-022-09778-9 – volume: 9 start-page: 31805 year: 2021 ident: 11679_CR38 publication-title: IEEE Access doi: 10.1109/ACCESS.2021.3060317 – volume: 127 start-page: 341 issue: 1 year: 2022 ident: 11679_CR10 publication-title: Wireless Personal Communications doi: 10.1007/s11277-021-08266-w – volume: 5 start-page: 284 issue: 11 year: 2021 ident: 11679_CR23 publication-title: International Journal of Engineering Applied Sciences and Technology. doi: 10.33564/IJEAST.2021.v05i11.047 – volume: 21 start-page: 53 issue: 12 year: 2021 ident: 11679_CR2 publication-title: International Journal of Computer Science & Network Security. – ident: 11679_CR22 doi: 10.1007/978-3-642-04101-3_4 – volume: 78 year: 2023 ident: 11679_CR26 publication-title: Journal of Information Security and Applications doi: 10.1016/j.jisa.2023.103607 – start-page: 141 volume-title: International Symposium on Ubiquitous Networking year: 2015 ident: 11679_CR16 – volume: 12 start-page: 256 issue: 2 year: 2020 ident: 11679_CR4 publication-title: International Journal of Communication Networks and Information Security. – volume: 16 start-page: 46 issue: 2 year: 2023 ident: 11679_CR29 publication-title: J. Comput. Robot. – volume: 147 start-page: 43 issue: 10 year: 2016 ident: 11679_CR8 publication-title: International Journal of Computer Applications doi: 10.5120/ijca2016911203 – ident: 11679_CR7 doi: 10.11591/ijece.v11i3.pp2335-2342 – volume: 10 start-page: 74164 year: 2022 ident: 11679_CR18 publication-title: IEEE Access doi: 10.1109/ACCESS.2022.3184012 – volume: 10 start-page: 2434 issue: 14 year: 2022 ident: 11679_CR12 publication-title: Mathematics doi: 10.3390/math10142434 – volume: 23 start-page: 3287 issue: 6 year: 2023 ident: 11679_CR13 publication-title: Sensors doi: 10.3390/s23063287 – volume: 29 year: 2023 ident: 11679_CR27 publication-title: Measurement: Sensors |
| SSID | ssj0010092 |
| Score | 2.3574908 |
| Snippet | Sharing confidential information over an unprotected channel is prone to privacy breaches since unauthorized parties can steal the data. Therefore, developing... |
| SourceID | proquest crossref springer |
| SourceType | Aggregation Database Index Database Publisher |
| StartPage | 1905 |
| SubjectTerms | Access control Algorithms Apexes Communication channels Communications Engineering Computer Communication Networks Cryptography Data encryption Data integrity Digital currencies Edge joints Encryption Engineering Graph theory Integrity Networks Privacy Secrecy aspects Security Signal,Image and Speech Processing Wavelet transforms |
| Title | Data Security Using Crypto Bipartite Graph Theory with Modified Diffie–Hellman Algorithm |
| URI | https://link.springer.com/article/10.1007/s11277-024-11679-y https://www.proquest.com/docview/3256874911 |
| Volume | 139 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVLSH databaseName: SpringerLink Journals customDbUrl: mediaType: online eissn: 1572-834X dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0010092 issn: 0929-6212 databaseCode: AFBBN dateStart: 19970101 isFulltext: true providerName: Library Specific Holdings – providerCode: PRVAVX databaseName: SpringerLINK - Czech Republic Consortium customDbUrl: eissn: 1572-834X dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0010092 issn: 0929-6212 databaseCode: AGYKE dateStart: 19970101 isFulltext: true titleUrlDefault: http://link.springer.com providerName: Springer Nature – providerCode: PRVAVX databaseName: SpringerLink Journals (ICM) customDbUrl: eissn: 1572-834X dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0010092 issn: 0929-6212 databaseCode: U2A dateStart: 19970101 isFulltext: true titleUrlDefault: http://www.springerlink.com/journals/ providerName: Springer Nature |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3NTsJAEJ4oXvTgvxFBsgfjRUva3ULbI6hoNHBREvXS7HZ3lQiUSD3gyXfwDX0SZ0sravTArUk3k3ZmOvN1Z-ZbgANb11g9iFyLSY9brsNti3ummcrR2mYycHxt9iHbnfpF1728rd1mQ2HjvNs9L0mmkXo27OaYciPmFCutHViTRVhK-bYKsNQ4v7s6-6oeGCKhlGPPtHZgbM6GZf6W8jMhzVDmr8Jomm9aa9DNn3TaZvJUfUlENXr9ReI476usw2oGQElj6jEbsKCGm7DyjZZwE0rZot54QA7JjxGS8Rbcn_KEk-vs3DuS9hyQk-fJKIlJszcyrpgocm6IsMl08p-YzV7SjmVPI-Alp2abSH28vWPK6w_4kDT6DzHKehxsQ7d1dnNyYWUnNFgR9ezE4jUa-FLUFdWOp5gOXMSDjEoaIQrDC-WwSHk-pzryPeFzgWgtErZy0QtqCCzYDhSG8VDtAqHSQ8_QAY9c7XKMo7YUQmsWCPyFlUIW4Sg3UziaEnGEM8plo88Q9Rmm-gwnRSjnlgyzj3IcMoR3vudieC_CcW6Y2e3_pe3Nt7wEyzS1rWl6KUMheX5R-whdElFBT201m51K5rEVWOzSxidfluja |
| linkProvider | Springer Nature |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV29TsMwED5BGYABQQFRWsADYoFIiZ00yVhaoEDbhVZCLJEd21CJ_oiGoRvvwBvyJJzThFIEA1ukWDfcXe6-3M9ngGNbe6waxq7FpM8t1-G2xX0zTOVobTMZOoE2dch2p9rsuTf33n22FDbJp93zlmQaqefLbo5pN2JOsdLegTVdhhVDYGUY83u09tU7MDRCKcOeGezAyJytyvwuYzEdzTHmj7Zomm0uN2Ejg4mkNrPrFiypYRHWv5EHFqGcHepPBuSELCx6TLbhocETTu6y2-lIOhlA6i_TcTIi5_2xcZhEkStDV01m-_nElGRJeyT7GmEpaZhijvp4e8fE9DzgQ1J7fhyhrKfBDvQuL7r1ppXdo2DF1LcTi3s0DKSoKqodXzEduojaGJU0RqyED8phsfIDTnUc-CLgAjFVLGzloq08TP9sFwrD0VDtAaHSR_vpkMeudjlGO1sKoTULBf5oSiFLcJqrMxrP6DKiOTGyUX6Eyo9S5UfTElRyjUfZpzOJGIKwwHcxCJfgLLfC_PXf0vb_d_wIVpvdditqXXduy7BGU6cwYyoVKCQvr-oAwUYiDlPf-gTHM8wT |
| linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV07T8MwED5BkRAMiKco5eEBsUDUxHabZCyUUp5CgkoVS2THNlSiaUXD0I3_wD_kl3BOU0oRDGyRYt1wd7n7co_PAPuuqbBqGHOHKV843BOuI3w7TOUZ4zIVeoGxdcjrm2qzxS_alfa3Lf5s2n3ckhztNFiWpiQt95UpTxbfPNt6xPziZH0EZzgLc9wSJaBHt2jtq49gKYUytj075IFROl-b-V3GdGqa4M0fLdIs8zSWYSmHjKQ2svEKzOhkFRa_EQmuQik_1Bl0yQGZWvoYrMFDXaSC3OU31ZFsSoCcvAz7aY8cd_rWeVJNzix1NRnt6hNbniXXPdUxCFFJ3RZ29MfbOyap565ISO35sYeynrrr0Gqc3p80nfxOBSemvps6okLDQMmqpsbzNTMhRwTHqKIx4iZ80B6LtR8IauLAl4GQiK9i6WqOdqsgFGAbUEh6id4EQpWPtjShiLnhAiOfq6Q0hoUSfzqVVEU4HKsz6o-oM6IJSbJVfoTKjzLlR8MibI81HuWf0SBiCMgCn2NALsLR2AqT139L2_rf8T2Yv603oqvzm8sSLNDMJ-zEyjYU0pdXvYO4I5W7mWt9Aqm_0E8 |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Data+Security+Using+Crypto+Bipartite+Graph+Theory+with+Modified+Diffie%E2%80%93Hellman+Algorithm&rft.jtitle=Wireless+personal+communications&rft.au=Shastri%2C+V.+Harsha&rft.au=Pragathi%2C+C&rft.date=2024-12-01&rft.pub=Springer+Nature+B.V&rft.issn=0929-6212&rft.eissn=1572-834X&rft.volume=139&rft.issue=4&rft.spage=1905&rft.epage=1926&rft_id=info:doi/10.1007%2Fs11277-024-11679-y&rft.externalDBID=NO_FULL_TEXT |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0929-6212&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0929-6212&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0929-6212&client=summon |