Figure 3From: Secure Network Coding against Wiretapping and Byzantine AttacksThe source node transforms the packets and by , and sends the outputs and to sink nodes and .Back to article page