Fig. 2From: A secure data interaction method based on edge computingIllustration of the phenomenon that we observe from the experiments and the motivation for our methodBack to article page