Figure 5From: Efficient weakly secure network coding scheme against node conspiracy attack based on network segmentation Removed links E p vs. p . Back to article page