Common use of Computational Cost Clause in Contracts

Computational Cost. In this subsection, the proposed scheme is compared with the schemes proposed by ▇▇▇ et al. [51], ▇▇▇▇▇▇ et al. [53], ▇▇▇▇▇ et al. [42] and ▇▇▇▇▇ et al. [54]. The key results obtained from the comparison are shown in Table II to determine the effectiveness of the proposed scheme. The COMPARISON OF COMPUTATIONAL COSTS (IN MILLISECONDS) Schemes 𝒟ℛ𝒩𝑢/smart IoT device 𝒟ℛ𝒩𝑣/smart IoT device Total (in milliseconds) Das et al [51] 5.28 5.28 10.56 ▇▇▇▇▇▇ et al [53] 5.28 5.28 10.56 ▇▇▇▇▇ et al [42] 8.62 18.65 27.27 ▇▇▇▇▇ et al [54] 5.28 5.28 10.56 Proposed 2.88 2.88 5.76

Appears in 1 contract

Sources: Certificate Based Access Control and Key Agreement Scheme

Computational Cost. In this subsection, the proposed scheme is compared with the schemes proposed by ▇▇▇ et al. [51], ▇▇▇▇▇▇ et al. [53], ▇▇▇▇▇ et al. [42] and ▇▇▇▇▇ et al. [54]. The key results obtained from the comparison are shown in Table II to determine the effectiveness of the proposed scheme. The COMPARISON OF COMPUTATIONAL COSTS (IN MILLISECONDS) Schemes 𝒟ℛ𝒩𝑢/smaℛ/smart rt IoT device 𝒟ℛ𝒩𝑣/ℛ/smart smart IoT device Total (in milliseconds) Das et al [51] 5.28 5.28 10.56 ▇▇▇▇▇▇ et al [53] 5.28 5.28 10.56 ▇▇▇▇▇ et al [42] 8.62 18.65 27.27 ▇▇▇▇▇ et al [54] 5.28 5.28 10.56 Proposed 2.88 2.88 5.76

Appears in 1 contract

Sources: Certificate Based Access Control and Key Agreement Scheme