The security of passwords generated by the graphic lattices is based on the difficulty of the graph isomorphism, graceful tree conjecture, and total coloring conjecture. A graphic lattice is generated by a graphic base and graphical operations, where a graphic base is a group of disjointed, connected graphs holding linearly independent properties. We study the existence of graphic bases with odd-graceful total colorings and show graphic lattices by vertex-overlapping and edge-joining operations; we prove that these graphic lattices are closed to the odd-graceful total coloring
AbstractWe continue the study initiated in “Signed graph coloring” of the chromatic and Whitney poly...
The ladder graph plays an important role in many applications as Electronics, Electrical and Wireles...
AbstractA unichord is an edge that is the unique chord of a cycle in a graph. The class C of unichor...
It is known that there are no polynomial quantum algorithms to solve some lattice difficult problems...
The security of real networks is facing serious challenges and is harder than ever. We propose an id...
The security of real networks is facing serious challenges and is harder than ever.We propose an ide...
Safety of plain text passwords has been questioned in current researching information passwords. Gra...
Graphical passwords are facing a good opportunity as 2-dimension codes are accepted by many people, ...
The coming quantum computation is forcing us to reexamine the cryptosystems people use. We are apply...
The safety of the traditional text passwords is questioned by many users in the present information ...
Password Identification or Weak Authentication is one of the weakest points in accessing a system an...
The problem of vertex coloring holds an important place in engineering as it models situations in wh...
Graphical password (GPW) is one of various passwords used in information communication. The QR code,...
A comprehensive treatment of color-induced graph colorings is presented in this book, emphasizing ve...
A (p, q) connected graph is edge-odd graceful graph if there exists an injective map f: E(G) → {1, ...
AbstractWe continue the study initiated in “Signed graph coloring” of the chromatic and Whitney poly...
The ladder graph plays an important role in many applications as Electronics, Electrical and Wireles...
AbstractA unichord is an edge that is the unique chord of a cycle in a graph. The class C of unichor...
It is known that there are no polynomial quantum algorithms to solve some lattice difficult problems...
The security of real networks is facing serious challenges and is harder than ever. We propose an id...
The security of real networks is facing serious challenges and is harder than ever.We propose an ide...
Safety of plain text passwords has been questioned in current researching information passwords. Gra...
Graphical passwords are facing a good opportunity as 2-dimension codes are accepted by many people, ...
The coming quantum computation is forcing us to reexamine the cryptosystems people use. We are apply...
The safety of the traditional text passwords is questioned by many users in the present information ...
Password Identification or Weak Authentication is one of the weakest points in accessing a system an...
The problem of vertex coloring holds an important place in engineering as it models situations in wh...
Graphical password (GPW) is one of various passwords used in information communication. The QR code,...
A comprehensive treatment of color-induced graph colorings is presented in this book, emphasizing ve...
A (p, q) connected graph is edge-odd graceful graph if there exists an injective map f: E(G) → {1, ...
AbstractWe continue the study initiated in “Signed graph coloring” of the chromatic and Whitney poly...
The ladder graph plays an important role in many applications as Electronics, Electrical and Wireles...
AbstractA unichord is an edge that is the unique chord of a cycle in a graph. The class C of unichor...