Fig. 3From: On the performance of physical layer security in virtual full-duplex non-orthogonal multiple access systemThe EST of users m, n and p versus \(P_R\)Back to article page