Fig. 2From: A study on the integrity and authentication of weather observation data using Identity Based EncryptionAlgorithm for signature based on ID (Boneh and Boyen 2004; Emerging S&T Report 2005)Back to article page