Research Article
[Retracted] Design and Implementation of Cloud Computing Network Security Virtual Computing and Defense Technology
Figure 4
Variation of trusted report generation time with the number of authentication requests in two authentication schemes.