Fig. 1From: Advances of SBAS authentication technologiesSchematic diagram of authentication based on digital signatureBack to article page