Skip to main content
. 2019 May 19;19(10):2310. doi: 10.3390/s19102310

Figure 11.

Figure 11

Packet key encryption and decryption for the secure datagram flow.