On the Size of Source Space in a Secure MAC | IEEE Journals & Magazine | IEEE Xplore