X He,
A Yener - IEEE transactions on wireless
communications, 2012 - ieeexplore.ieee.org
… We show that, in this network, secure communication is … through the route using these
untrusted nodes. Furthermore, we … no matter how many eavesdropping relays are present, and …