Fig. 2From: Efficient adaptive framework for securing the Internet of Things devicesGraphical representation of mapping between IoT devices and cryptographic schemes. a Initial bipartite graph, b Modified bipartite graph G′, and c Final bipartite graph G′′ to solve the assignment problemBack to article page