Figure 5From: Two-Hop Secure Communication Using an Untrusted Relay Channel model after transformation. Back to article page