Fig. 15From: Comprehensive evaluation of key management hierarchies for outsourced dataElapsed time performance of data owner machine for evaluating user threadsBack to article page