Crypto-coding technique based on polar code and secret key generated from wireless channel characteristics for wireless communication systems
Fig 5
An example of the proposed secure polar code.
Click through the PLOS taxonomy to find articles in your field.
For more information about PLOS Subject Areas, click here.
An example of the proposed secure polar code.