Fig. 8From: A study on the integrity and authentication of weather observation data using Identity Based EncryptionOperating procedure of the proposal systemBack to article page