C Cai, Y Cai,
X Zhou, W Yang… - … Forensics and
Security, 2014 - ieeexplore.ieee.org
… 1, we consider a relay network consisting of one source (S), several relays (Rl,l = 1, 2,...),
one destination (D), and several eavesdroppers (Ej, j = 1, 2,...). All the nodes are equiped with …