Return to Article Details Enhancing Data Security Through Graph Theory Download Download PDF