Fig. 4From: A study on the integrity and authentication of weather observation data using Identity Based EncryptionMessage transmission using an identity based signatureBack to article page