Fig. 3From: A secure cross-domain authentication scheme based on threshold signature for MECComparison of the signature verification timeBack to article page