Research Article
An Intelligent and Secure Health Monitoring Scheme Using IoT Sensor Based on Cloud Computing
Table 3
The computation cost of our scheme.
| |||||||||||||||||||||||||||||||||||
: the time to execute a one-way hash function. : the time to execute a symmetric encryption/decryption operation. : the time to execute an asymmetric encryption/decryption operation. : the time to execute/verify a signature. |