Fig. 4From: Virtual full-duplex buffer-aided relay selection schemes for secure cooperative wireless networksThe maximum secrecy throughput versus number of relays for different relaying protocolsBack to article page