Fig. 1From: A study on the integrity and authentication of weather observation data using Identity Based EncryptionAlgorithm for encryption based on ID (Boneh and Boyen 2004; Emerging S&T Report 2005)Back to article page