Fig. 2From: A secure cross-domain authentication scheme based on threshold signature for MECComparison of the signature timeBack to article page