Research Article
[Retracted] E-Commerce Data Access Control and Encrypted Storage Based on Internet of Things
Figure 3
Test results of the three methods. (a) Encryption time consumption results, (b) decryption time consumption result, (c) and time consumption result of key acquisition.
(a) |
(b) |
(c) |