Table 18.
Negative Distance from Average.
Authors & Ref. No. | Computation Time | Communication Overhead | Security Strength | Security Hardness | Security Requirements |
---|---|---|---|---|---|
Amin et al. [80] | 0 | 0 | 1 | 0 | 1 |
Wang and Liu [69] | 0.024824448 | 0.315068493 | 1 | 1 | 1 |
Li and Hong [70] | 0 | 0.315068493 | 1 | 1 | 1 |
Jawaid et al. [83] | 0 | 0 | 1 | 0 | 1 |
Mutaz et al. [71] | 0.502226119 | 0 | 0 | 1 | 1 |
Lu et al. [72] | 2.891748059 | 2.193737769 | 0 | 1 | 1 |
Li et al. [73] | 0.59756282 | 0.315068493 | 0 | 1 | 1 |
Prameela & Ponmuthuramalingam [74] | 0 | 0 | 0 | 1 | 1 |
Omala et al. [75] | 0.537595855 | 0 | 0 | 1 | 1 |
Omala et al. [81] | 0 | 0 | 0 | 0 | 1 |
Gao et al. [82] | 0 | 0 | 0 | 0 | 1 |
Ullah et al. [84] | 0 | 0 | 1 | 0 | 1 |
Jawaid et al. [76] | 0.502226119 | 0 | 0 | 1 | 1 |
Noor et al. [85] | 0 | 0 | 1 | 0 | 1 |
Hu et al. [77] | 0.556088662 | 1.066536204 | 0 | 1 | 1 |