Transmitting and sharing sensitive data between two or more legitimate entities has become a daunting task due to the ever-increasing unintended use of the Internet in technology and communications. The only way to protect data from cyberattacks is to mask sensitive information in transit. Graph theory has long played...