“…The computational cost of the comparative studies 11,[14][15][16][18][19][20][21][22][23]31,32 including proposed scheme is shown in Table 4. According to this table the computational cost of symmetric cryptography-based schemes 11,15,[18][19][20][21]23,31 and proposed scheme is depicted as .285, .628, .562, .577, .556, .532, .40, .41, and .54 ms, respectively. Similarly, the computational latency for asymmetric crypto-primitives based costly solutions [14][15][16]22,32 is computed as 49.91, 62.43, 12.69, 171.567, and .40 ms, respectively.…”