{"id":"https://openalex.org/W4402064814","doi":"https://doi.org/10.1142/s179300572650016x","title":"Integrating Fuzzy Graph Theory into Cryptography: A Survey of Techniques and Security Applications","display_name":"Integrating Fuzzy Graph Theory into Cryptography: A Survey of Techniques and Security Applications","publication_year":2024,"publication_date":"2024-08-30","ids":{"openalex":"https://openalex.org/W4402064814","doi":"https://doi.org/10.1142/s179300572650016x"},"language":"en","primary_location":{"id":"doi:10.1142/s179300572650016x","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s179300572650016x","pdf_url":null,"source":{"id":"https://openalex.org/S135331755","display_name":"New Mathematics and Natural Computation","issn_l":"1793-0057","issn":["1793-0057","1793-7027"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"New Mathematics and Natural Computation","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102968100","display_name":"Rashmi Singh","orcid":null},"institutions":[{"id":"https://openalex.org/I191972202","display_name":"Amity University","ror":"https://ror.org/02n9z0v62","country_code":"IN","type":"education","lineage":["https://openalex.org/I191972202"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Rashmi Singh","raw_affiliation_strings":["Department of Mathematics, Amity Institute of Applied Sciences, Amity University, Noida, Uttar Pradesh, India"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics, Amity Institute of Applied Sciences, Amity University, Noida, Uttar Pradesh, India","institution_ids":["https://openalex.org/I191972202"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057186682","display_name":"Saifullah Khalid","orcid":"https://orcid.org/0000-0002-3666-7398"},"institutions":[{"id":"https://openalex.org/I2800494708","display_name":"Government Medical College, Amritsar","ror":"https://ror.org/046bk9643","country_code":"IN","type":"education","lineage":["https://openalex.org/I2800494708"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Saifullah Khalid","raw_affiliation_strings":["Airport Authority of India, Amritsar, Punjab, India"],"affiliations":[{"raw_affiliation_string":"Airport Authority of India, Amritsar, Punjab, India","institution_ids":["https://openalex.org/I2800494708"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5104987542","display_name":"D. K. Nishad","orcid":null},"institutions":[{"id":"https://openalex.org/I2799532815","display_name":"Madan Mohan Malaviya University of Technology","ror":"https://ror.org/04h1w2j35","country_code":"IN","type":"education","lineage":["https://openalex.org/I2799532815"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"D. K. Nishad","raw_affiliation_strings":["Electrical Engineering Department, Madan Mohan Malaviya University of Technology, Gorakhpur, Uttar Pradesh, India"],"affiliations":[{"raw_affiliation_string":"Electrical Engineering Department, Madan Mohan Malaviya University of Technology, Gorakhpur, Uttar Pradesh, India","institution_ids":["https://openalex.org/I2799532815"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5109449892","display_name":"Ruchira","orcid":null},"institutions":[{"id":"https://openalex.org/I191972202","display_name":"Amity University","ror":"https://ror.org/02n9z0v62","country_code":"IN","type":"education","lineage":["https://openalex.org/I191972202"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Ruchira","raw_affiliation_strings":["Department of Electrical and Electronics Engineering, Amity School of Engineering and Technology, Amity University, Noida, Uttar Pradesh, India"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Electronics Engineering, Amity School of Engineering and Technology, Amity University, Noida, Uttar Pradesh, India","institution_ids":["https://openalex.org/I191972202"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5102968100"],"corresponding_institution_ids":["https://openalex.org/I191972202"],"apc_list":null,"apc_paid":null,"fwci":7.0148,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.96953806,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"22","issue":"01","first_page":"271","last_page":"290"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.8492000102996826,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.8492000102996826,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13062","display_name":"Cognitive Computing and Networks","score":0.82669997215271,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.7820000052452087,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6688424348831177},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6336170434951782},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5518605709075928},{"id":"https://openalex.org/keywords/neural-cryptography","display_name":"Neural cryptography","score":0.4642511010169983},{"id":"https://openalex.org/keywords/fuzzy-logic","display_name":"Fuzzy logic","score":0.4597610831260681},{"id":"https://openalex.org/keywords/graph-theory","display_name":"Graph theory","score":0.44953563809394836},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.3410300016403198},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.31799376010894775},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.26981422305107117},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.22184565663337708},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.216197669506073}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6688424348831177},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6336170434951782},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5518605709075928},{"id":"https://openalex.org/C126954023","wikidata":"https://www.wikidata.org/wiki/Q4316440","display_name":"Neural cryptography","level":4,"score":0.4642511010169983},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.4597610831260681},{"id":"https://openalex.org/C88230418","wikidata":"https://www.wikidata.org/wiki/Q131476","display_name":"Graph theory","level":2,"score":0.44953563809394836},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.3410300016403198},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.31799376010894775},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.26981422305107117},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.22184565663337708},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.216197669506073},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1142/s179300572650016x","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s179300572650016x","pdf_url":null,"source":{"id":"https://openalex.org/S135331755","display_name":"New Mathematics and Natural Computation","issn_l":"1793-0057","issn":["1793-0057","1793-7027"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"New Mathematics and Natural Computation","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":74,"referenced_works":["https://openalex.org/W277751999","https://openalex.org/W1197622812","https://openalex.org/W1498316612","https://openalex.org/W1514038307","https://openalex.org/W1529762651","https://openalex.org/W1565315122","https://openalex.org/W1577893785","https://openalex.org/W1853840354","https://openalex.org/W1974183452","https://openalex.org/W1982485306","https://openalex.org/W1990341706","https://openalex.org/W1993842059","https://openalex.org/W2000921231","https://openalex.org/W2013045208","https://openalex.org/W2027402490","https://openalex.org/W2028649872","https://openalex.org/W2029332440","https://openalex.org/W2077170678","https://openalex.org/W2079325629","https://openalex.org/W2084126977","https://openalex.org/W2089491238","https://openalex.org/W2119893066","https://openalex.org/W2129570464","https://openalex.org/W2138001464","https://openalex.org/W2145479133","https://openalex.org/W2158054592","https://openalex.org/W2159371584","https://openalex.org/W2161171165","https://openalex.org/W2182667965","https://openalex.org/W2199650320","https://openalex.org/W2228502273","https://openalex.org/W2297736004","https://openalex.org/W2460984000","https://openalex.org/W2489172749","https://openalex.org/W2557149854","https://openalex.org/W2594881659","https://openalex.org/W2750841075","https://openalex.org/W2751846886","https://openalex.org/W2760476350","https://openalex.org/W2772103904","https://openalex.org/W2779321393","https://openalex.org/W2791064953","https://openalex.org/W2796262751","https://openalex.org/W2801499551","https://openalex.org/W2808890614","https://openalex.org/W2896497501","https://openalex.org/W2911083331","https://openalex.org/W2940741117","https://openalex.org/W2956015923","https://openalex.org/W2964805353","https://openalex.org/W2971393319","https://openalex.org/W2971523404","https://openalex.org/W2971748510","https://openalex.org/W2979406407","https://openalex.org/W2990147509","https://openalex.org/W3005613295","https://openalex.org/W3006748619","https://openalex.org/W3012034298","https://openalex.org/W3081756357","https://openalex.org/W3094003808","https://openalex.org/W3132056502","https://openalex.org/W3141796657","https://openalex.org/W4211007335","https://openalex.org/W4213179862","https://openalex.org/W4249749961","https://openalex.org/W4285153431","https://openalex.org/W4308529607","https://openalex.org/W4311630555","https://openalex.org/W4313314982","https://openalex.org/W4319595549","https://openalex.org/W4320925594","https://openalex.org/W4362647126","https://openalex.org/W4380996160","https://openalex.org/W4386014944"],"related_works":["https://openalex.org/W2155942762","https://openalex.org/W2528415955","https://openalex.org/W2189400933","https://openalex.org/W2188587181","https://openalex.org/W2565952052","https://openalex.org/W3197555326","https://openalex.org/W2548040793","https://openalex.org/W1506702996","https://openalex.org/W2094483166","https://openalex.org/W2393841853"],"abstract_inverted_index":{"Since":[0,70],"the":[1,21,29,46,71,78,110,117,142,159,162,199,236,247],"advent":[2],"of":[3,24,33,74,146,165,201,213,238,249],"networked":[4,35],"systems,":[5,36],"fuzzy":[6,38,60,75,123,129,148,166,202],"graph":[7,39],"theory":[8,40],"has":[9,43],"surfaced":[10],"as":[11,45,97,122,198],"a":[12],"fertile":[13],"paradigm":[14],"for":[15,125,132,173,235],"handling":[16,25],"uncertainties":[17,30],"and":[18,31,66,85,102,128,144,155,169,189,194,211,231,242,252],"ambiguities.":[19],"Among":[20],"different":[22,147],"modes":[23],"challenges":[26,193],"created":[27],"by":[28,114],"ambiguities":[32],"current":[34],"integrating":[37],"with":[41,138,208],"cryptography":[42,168,215],"emerged":[44],"most":[47],"promising":[48],"approach.":[49],"In":[50],"this":[51,53,228],"regard,":[52],"review":[54,222],"paper":[55,106],"elaborates":[56],"on":[57,116],"potentially":[58],"studying":[59],"graph-based":[61,149,167],"cryptographic":[62,79,244],"techniques,":[63],"application":[64],"perspectives,":[65],"future":[67],"research":[68,111,195,234],"directions.":[69],"expressive":[72],"power":[73],"graphs":[76],"allows":[77],"schemes":[80],"to":[81,86],"handle":[82],"imprecise":[83],"information":[84],"enhance":[87],"security":[88,153,163],"in":[89,108,151,176,186,246],"many":[90],"domains,":[91],"several":[92],"domains":[93],"have":[94],"benefited,":[95],"such":[96,121,197],"image":[98],"encryption,":[99],"key":[100,126],"management,":[101],"attribute-based":[103],"encryption.":[104],"The":[105],"analyzes":[107],"depth":[109],"landscape,":[112],"mainly":[113],"focusing":[115],"varied":[118],"techniques":[119],"used,":[120],"logic":[124,203],"generation":[127],"attribute":[130],"representation":[131],"access":[133,184],"control":[134,185],"policies.":[135],"A":[136],"comparison":[137],"performance":[139],"metrics":[140],"unveils":[141],"trade-offs":[143],"advantages":[145],"approaches":[150],"efficiency,":[152],"strength,":[154],"computational":[156],"overhead.":[157],"Additionally,":[158],"survey":[160],"explores":[161],"applications":[164],"underpins":[170],"potential":[171],"development":[172],"secure":[174,243],"communication":[175],"wireless":[177],"sensor":[178],"networks,":[179],"privacy-preserving":[180],"data":[181],"mining,":[182],"fine-grained":[183],"cloud":[187],"computing,":[188],"blockchain":[190],"security.":[191],"Some":[192],"directions,":[196],"standardization":[200],"operators,":[204],"algorithmic":[205],"optimization,":[206],"integration":[207],"emerging":[209],"technologies,":[210],"exploitation":[212],"post-quantum":[214],"applications,":[216],"are":[217],"also":[218],"brought":[219],"out.":[220],"This":[221],"will":[223],"thus":[224],"bring":[225],"insight":[226],"into":[227],"interdisciplinary":[229],"domain":[230],"stimulate":[232],"further":[233],"design":[237],"more":[239],"robust,":[240],"adaptive,":[241],"systems":[245],"wake":[248],"rising":[250],"complexities":[251],"uncertainties.":[253]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":7}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
