Skip to main content

Advances, Systems and Applications

Table 6 Comparative evaluation of throughput

From: An enhanced encryption-based security framework in the CPS Cloud

Methods

Throughput (Mbps)

RSA [22]

58

Twofish Algorithm [23]

65

ICC [24]

70

FHEA [25]

85

CBM [Proposed]

97