Figure 3From: Efficient weakly secure network coding scheme against node conspiracy attack based on network segmentationAn example of link transformation. (a) in(i) = 1, out(i) = 1; (b) in(i) = 1, out(i) > 1, (c) in(i) > 1; out(i) = 1; and (d) in(i) > 1, out(i) > 1.Back to article page