Research Article

An Efficient Integrity Verification and Authentication Scheme over the Remote Data in the Public Clouds for Mobile Users

Figure 4

Computation cost for tag generation.