Research Article

A Cross-Domain Authentication Optimization Scheme between Heterogeneous IoT Applications

Figure 5

Permission verification time.