Research Article
Based on the Role of Internet of Things Security in the Management of Enterprise Human Resource Information Leakage
Table 5
The running time of encryption operation in different environments.
| — | T pair | T mac | T h | T Gh | T add |
| Mobile terminal | 0.015 s | 0.01 s | <0.001 s | <0.01 s | 0.012 s | Server | 3.58 ms | 1.71 ms | <0.001 ms | <0.01 ms | 0.001 ms | Management side | 0.024 s | 0.013 s | <0.001 s | <0.01 s | 0.014 s |
|
|