Figure 2From: Secure Network Coding against Wiretapping and Byzantine Attacks(a) The source node sends to sink nodes and . For security Cai et al. add an independent random packet to . (b) At source node we transform the packets into by a linear ANOT then send the pseudopackets and to sink nodes.Back to article page