Research Article
Multifactor Authentication for Smart Emergency Medical Response Transporters
Table 2
The computational time of crypto-operations [
51,
52].
| Operation | Description | Time (ms) |
| | Scalar multiplication | 32.3 | | Asymmetric encryption/decryption | 311.8 | | Execute/verify a signature | 322.3 | | Symmetric encryption/decryption | 7.2 | | Bilinear pairing | 31.3 | | One-way hash function | 0.33 |
|
|