Finite Time Encryption Schedule in the Presence of an Eavesdropper with Operation Cost | IEEE Conference Publication | IEEE Xplore