C Zhang, J Ge, F Gong, F Jia, N Guo - IEEE Systems Journal, 2019 - ieeexplore.ieee.org
… assume that the relay is trusted. In fact, the relay belonging to D2D communications in a …
have lower security than the sources, that is, the relay is in effect also an eavesdropper [14]–…