Fig. 4From: Security-Aware computation offloading for Mobile edge computing-Enabled smart cityComparison of time consumptionBack to article page