From: Two-Hop Secure Communication Using an Untrusted Relay
Relay's power
Jammer's power
Figure 6
Proportional
Optimal
Figure 7
Fixed
Figure 8
Limited
Figure 9
Figure 10
Figure 11