Bridging privacy-preserving approaches: a formal comparison of k-automorphism, k-isomorphism, and k-symmetry

Today's article comes from the EURASIP Journal on Information Security. The authors are Medkova et al., from the University of Hradec Kralove, in the Czech Republic. In this paper, they explore and compare some of the nuances of graph theory: automorphism, isomorphism, and symmetry.

DOI: 10.1186/s13635-025-00220-8

Book
Book

Members Only

You must be an active Journal Club member to access this content. If you're already a member, click the blue button to login. If you're not a member yet, click the sign-up button to get started.

Login to My Account Sign Up