Skip to main content
Advertisement
Browse Subject Areas
?

Click through the PLOS taxonomy to find articles in your field.

For more information about PLOS Subject Areas, click here.

< Back to Article

Crypto-coding technique based on polar code and secret key generated from wireless channel characteristics for wireless communication systems

Fig 5

An example of the proposed secure polar code.

Fig 5

doi: https://doi.org/10.1371/journal.pone.0318110.g005