Table 18.
Negative Distance from Average.
| Authors & Ref. No. | Computation Time | Communication Overhead | Security Strength | Security Hardness | Security Requirements |
|---|---|---|---|---|---|
| Amin et al. [80] | 0 | 0 | 1 | 0 | 1 |
| Wang and Liu [69] | 0.024824448 | 0.315068493 | 1 | 1 | 1 |
| Li and Hong [70] | 0 | 0.315068493 | 1 | 1 | 1 |
| Jawaid et al. [83] | 0 | 0 | 1 | 0 | 1 |
| Mutaz et al. [71] | 0.502226119 | 0 | 0 | 1 | 1 |
| Lu et al. [72] | 2.891748059 | 2.193737769 | 0 | 1 | 1 |
| Li et al. [73] | 0.59756282 | 0.315068493 | 0 | 1 | 1 |
| Prameela & Ponmuthuramalingam [74] | 0 | 0 | 0 | 1 | 1 |
| Omala et al. [75] | 0.537595855 | 0 | 0 | 1 | 1 |
| Omala et al. [81] | 0 | 0 | 0 | 0 | 1 |
| Gao et al. [82] | 0 | 0 | 0 | 0 | 1 |
| Ullah et al. [84] | 0 | 0 | 1 | 0 | 1 |
| Jawaid et al. [76] | 0.502226119 | 0 | 0 | 1 | 1 |
| Noor et al. [85] | 0 | 0 | 1 | 0 | 1 |
| Hu et al. [77] | 0.556088662 | 1.066536204 | 0 | 1 | 1 |