Figure 7From: Efficient weakly secure network coding scheme against node conspiracy attack based on network segmentation Successful rate r vs. p. Back to article page