Research Article

Efficient Authentication for Internet of Things Devices in Information Management Systems

Figure 4

The comparison of computation cost.