Research Article

Study on Delay Optimization of Fog Computing Edge Nodes Based on the CPSO-LB Algorithm

Table 1

Comparison of identity authentication performance and security.

ProgramPair operationPoint multiplicationCommunication timesΦ1Φ2Φ3Φ4

Literature [16]052×
Literature [17]024×
Literature [18]053×
Literature [19]152××
Literature [20]052
Literature [21]052
This article042