Figure 5
From: Identity-based controlled delegated outsourcing data integrity auditing scheme

Key generation verification and proof of authority generation verification time overheads.
From: Identity-based controlled delegated outsourcing data integrity auditing scheme

Key generation verification and proof of authority generation verification time overheads.