Fig. 7From: Cloud-edge data encryption in the internet of vehicles using Zeckendorf representationTime cost for generating the keystreamBack to article page