Research Article

Based on the Role of Internet of Things Security in the Management of Enterprise Human Resource Information Leakage

Table 5

The running time of encryption operation in different environments.

T pairT macT hT GhT add

Mobile terminal0.015 s0.01 s<0.001 s<0.01 s0.012 s
Server3.58 ms1.71 ms<0.001 ms<0.01 ms0.001 ms
Management side0.024 s0.013 s<0.001 s<0.01 s0.014 s