Research Article

A Distributed Access Control with Outsourced Computation in Fog Computing

Figure 9

Comparison of computation cost in decryption.