Research Article

An Internet of Things (IoT)-Based Optimization to Enhance Security in Healthcare Applications

Figure 6

Comparative analysis of decryption time in suggested and traditional methods.