Fig. 17
From: Comprehensive evaluation of key management hierarchies for outsourced data

Average elapsed time of one user revoke operation
From: Comprehensive evaluation of key management hierarchies for outsourced data
Average elapsed time of one user revoke operation