Fig. 5From: A secure cross-domain authentication scheme based on threshold signature for MECComparison of the authentication timeBack to article page