Figure 6From: Efficient weakly secure network coding scheme against node conspiracy attack based on network segmentation Removed links E p vs. N. Back to article page