Research Article

[Retracted] Ideological and Political Teaching Resource Sharing Method Based on Edge Computing

Figure 8

Comparison of encryption time of different algorithms.