Research Article
[Retracted] Certificateless Batch Authentication Scheme and Intrusion Detection Model Based on the Mobile Edge Computing Technology NDN-IoT Environment
Figure 7
Influence of the change of eavesdropping intensity on the optimal upload calculation.