Research Article

Data Protection of Accounting Information Based on Big Data and Cloud Computing

Figure 6

Two algorithms in ciphertext encryption and decryption time. (a) Comparison of ciphertext encryption time. (b) Comparison of ciphertext decryption time.
(a)
(b)