Figure 4From: Two-Hop Secure Communication Using an Untrusted Relay Two-eavesdropper channel. Back to article page