Figure 6From: Two-Hop Secure Communication Using an Untrusted Relay Secrecy Rate, , , optimal Back to article page