Figure 1From: Two-Hop Secure Communication Using an Untrusted Relay Two-hop communication using an untrusted relay. Back to article page