Research Article

Information Sharing and Privacy Protection of Electronic Nursing Record Management System

Figure 7

Runtime of each phase of different signature interception schemes.