Research Article
Data Protection of Accounting Information Based on Big Data and Cloud Computing
Figure 6
Two algorithms in ciphertext encryption and decryption time. (a) Comparison of ciphertext encryption time. (b) Comparison of ciphertext decryption time.
(a) |
(b) |