Skip to main content
. 2022 Feb 4;13(3):2329–2342. doi: 10.1007/s13204-021-02164-0

Fig. 6.

Fig. 6

Average encryption time analysis for varying data size scenario