Research Article

Two Secure Privacy-Preserving Data Aggregation Schemes for IoT

Figure 4

The difference value of total computational cost of Scheme-I and Scheme-II.