Fig. 4
From: A secure and scalable IoT access control framework with dynamic attribute updates and policy hiding

(a) Decryption time. (b) Ciphertext address update time.
From: A secure and scalable IoT access control framework with dynamic attribute updates and policy hiding
(a) Decryption time. (b) Ciphertext address update time.