Research Article

Protecting Private Data by Honey Encryption

Figure 3

Time to encrypt/decrypt a message.
(a) Encryption
(b) Decryption