Research Article

A Trusted and Privacy-Preserved Dispersed Computing Scheme for the Internet of Mobile Things

Figure 11

Time-consumption of proposed algorithms. (a) Security domain division. (b) Task offloading.
(a)
(b)