Research Article

Achieving Incentive, Security, and Scalable Privacy Protection in Mobile Crowdsensing Services

Figure 4

Running time of data encryption.