Research Article

A User-Defined Location-Sharing Scheme with Efficiency and Privacy in Mobile Social Networks

Table 2

Computational overhead of encryption and decryption.

Size (bytes)3264128102410 k1 M

Hash (ms)66891114
Encryption (ms)1113211221362049
Decryption (ms)10112913052243822