These files contains the complete results of the work "Analysis and comparison of encryption and verification algorithms applied to a Fog Computing Architecture" send to the Journal of Information and Telecommunication. We use three different versions of Raspberry Pi: RPi 1 model b+, RPi 3 Model B and RPi 4.
Authors: