Figure 3From: Two-Hop Secure Communication Using an Untrusted Relay Equivalent Channel Model for Deriving the Upper Bound. Back to article page