Figure 11
From: Hybrid cryptographic approach for strengthening IoT and 5G/B5G network security

Throughput comparison of original and encrypted data in 5G Network.
From: Hybrid cryptographic approach for strengthening IoT and 5G/B5G network security

Throughput comparison of original and encrypted data in 5G Network.