Figure 1From: Efficient weakly secure network coding scheme against node conspiracy attack based on network segmentationNetwork coding. (a) Traditional network transmission. (b) Network coding transmission.Back to article page