Fig. 16From: A provably secure cluster-based hybrid hierarchical group key agreement for large wireless ad hoc networksComparison of computation time between NM-setup and NM-CHHBack to article page