Fig. 6From: Binary phase hopping based spreading code authentication techniquePerformance simulation of authentication moduleBack to article page