Fig. 5From: A study on the integrity and authentication of weather observation data using Identity Based EncryptionFlowchart for an encrypted communication on weather observation dataBack to article page