Figure 13.

Delay comparison.

Malekzadeh et al. EURASIP Journal on Information Security 2011 2011:4   doi:10.1186/1687-417X-2011-4
Download authors' original image