Return to Article Details Graph - Based Innovations in Cryptographic Security Download Download PDF