7
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Topological Graphic Passwords And Their Matchings Towards Cryptography

      Preprint

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Graphical passwords (GPWs) are convenient for mobile equipments with touch screen. Topological graphic passwords (Topsnut-gpws) can be saved in computer by classical matrices and run quickly than the existing GPWs. We research Topsnut-gpws by the matching of view, since they have many advantages. We discuss: configuration matching partition, coloring/labelling matching partition, set matching partition, matching chain, etc. And, we introduce new graph labellings for enriching Topsnut-matchings and show these labellings can be realized for trees or spanning trees of networks. In theoretical works we explore Graph Labelling Analysis, and show first that every graph admits our extremal labellings and set-type labellings in graph theory. Many of the graph labellings mentioned are related with problems of set matching partitions to number theory, and yield new objects and new problems to graph theory.

          Related collections

          Most cited references7

          • Record: found
          • Abstract: not found
          • Article: not found

          Adjacent strong edge coloring of graphs

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            On adjacent-vertex-distinguishing total coloring of graphs

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found
              Is Open Access

              Twin Odd-graceful Trees Towards Information Security

                Bookmark

                Author and article information

                Journal
                26 July 2018
                Article
                1808.03324
                b8b9a74d-4a55-4d3f-aa31-2d21e11a4760

                http://creativecommons.org/licenses/by/4.0/

                History
                Custom metadata
                cs.CR cs.DM

                Security & Cryptology,Discrete mathematics & Graph theory
                Security & Cryptology, Discrete mathematics & Graph theory

                Comments

                Comment on this article