Skip to main content

Advances, Systems and Applications

Table 4 Comparative evaluation of latency

From: An enhanced encryption-based security framework in the CPS Cloud

Methods

Latency (s)

RSA [22]

95

Twofish Algorithm [23]

84

ICC [24]

72

FHEA [25]

67

CBM [Proposed]

60