“…4,5 ) and g 2 (W 4,5,6 ): the user with side information W 1,2,3,4 can decode W 5,6 , which is insecure; 2) g 1 (W 4,5 ) and g 2 (W 5,6,7 ): the user with side information W (W 3,5 ) and g 2 (W 5,6,7 ): the user with side information W 6,7,8,9 can decode W 3,5 , which is insecure. c) Both transmissions involve 3 consecutive messages:We have the following cases:1) g 1 (W 4,5,6 ) and g 2 (W 4,5,6 ): a linear combination of these two transmissions can generate a linear combination of W 4,5 .…”