Fig. 3From: Advances of SBAS authentication technologiesSimplified scheme of the implementations of SBAS message authenticationBack to article page