Fig. 13From: A provably secure cluster-based hybrid hierarchical group key agreement for large wireless ad hoc networksComputation time: member vs cluster head in level-IBack to article page