2022
DOI: 10.3390/math10091592
|View full text |Cite
|
Sign up to set email alerts
|

Graph Colorings and Labelings Having Multiple Restrictive Conditions in Topological Coding

Abstract: With the fast development of networks, one has to focus on the security of information running in real networks. A technology that might be able to resist attacks equipped with AI techniques and quantum computers is the so-called topological graphic password of topological coding. In order to further study topological coding, we use the multiple constraints of graph colorings and labelings to propose 6C-labeling, 6C-complementary labeling, and its reciprocal-inverse labeling, since they can be applied to build… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 10 publications
0
1
0
Order By: Relevance
“…Topological coding is related to NP problems in graph theory and operations research, as well as many mathematical conjectures, making it computationally unbreakable or provable in terms of security. Since topological graphic passwords are related with many mathematical conjectures and NP-hard problems, so topological graphic passwords are computationally unbreakable or provable security, and the investigation of topological graphic passwords have been introduced in these articles [2,3,4,5,6,7,8].…”
Section: Introductionmentioning
confidence: 99%
“…Topological coding is related to NP problems in graph theory and operations research, as well as many mathematical conjectures, making it computationally unbreakable or provable in terms of security. Since topological graphic passwords are related with many mathematical conjectures and NP-hard problems, so topological graphic passwords are computationally unbreakable or provable security, and the investigation of topological graphic passwords have been introduced in these articles [2,3,4,5,6,7,8].…”
Section: Introductionmentioning
confidence: 99%