Skip to main content
. 2017 Jul 24;17(7):1695. doi: 10.3390/s17071695

Figure 5.

Figure 5

Computing cost for verification of outsourced encryption.