Fig. 3From: Secure data sharing scheme for VANETs based on edge computingResults of executing time for three different schemesBack to article page