Figure 2From: Efficient weakly secure network coding scheme against node conspiracy attack based on network segmentation Division chart of the network. Back to article page