Research Article
Lightweight Privacy Preservation for Securing Large-Scale Database-Driven Cognitive Radio Networks with Location Verification
Table 8
Computation costs of different protocols.
| | Computation cost | | SU | BS | DB |
| Gao et al. [20] | | - | |
| Grissa et al. [21] | | | |
| Our protocol |
| | |
|
|