Research Article

An Identity Authentication Scheme Based on SM2 Algorithm in UAV Communication Network

Figure 7

Histogram of the length of authentication.