Fig. 5
From: A secure and scalable IoT access control framework with dynamic attribute updates and policy hiding

(a) Access proof generation time. (b) Comparison of ciphertext verification time.
From: A secure and scalable IoT access control framework with dynamic attribute updates and policy hiding
(a) Access proof generation time. (b) Comparison of ciphertext verification time.