Research Article

[Retracted] E-Commerce Data Access Control and Encrypted Storage Based on Internet of Things

Figure 3

Test results of the three methods. (a) Encryption time consumption results, (b) decryption time consumption result, (c) and time consumption result of key acquisition.
(a)
(b)
(c)