Figure 8From: Efficient weakly secure network coding scheme against node conspiracy attack based on network segmentation Successful rate r vs. N. Back to article page