Fig. 2
From: A secure and scalable IoT access control framework with dynamic attribute updates and policy hiding

Comparison of time cost for encryption and decryption: (a) encryption time. (b) Decryption time.
From: A secure and scalable IoT access control framework with dynamic attribute updates and policy hiding
Comparison of time cost for encryption and decryption: (a) encryption time. (b) Decryption time.