Fig. 3From: Virtual full-duplex buffer-aided relay selection schemes for secure cooperative wireless networksThe maximum secrecy throughput versus SNR for different relaying protocolsBack to article page