Research Article
Secure Multi-Keyword Search and Access Control over Electronic Health Records in Wireless Body Area Networks
Figure 3
Computation overhead. (a) Key Generation time. (b) Encryption time. (c) Trapdoor Generation time. (d) Transform time. (e) Decryption time.
| (a) |
| (b) |
| (c) |
| (d) |
| (e) |