Fig. 17From: Comprehensive evaluation of key management hierarchies for outsourced dataAverage elapsed time of one user revoke operationBack to article page