Figure 2From: Two-Hop Secure Communication Using an Untrusted Relay Two-hop network with an external cooperative jammer, CJ. Back to article page