“…[15] investigated arbitrarily varying MAC with strong secrecy constraint, and provided bounds on its secrecy capacity region. [16]- [18] studied variations of the MAC with secrecy constraint, and proposed bounds on the corresponding secrecy capacity regions. [19] proposed cooperative jamming schemes for the multiple-access wiretap channel (MAC-WT), which enhance the secrecy capacity region.…”