Research Article

An Internet of Things (IoT)-Based Optimization to Enhance Security in Healthcare Applications

Figure 5

Comparative analysis of encryption time in suggested and traditional methods.