Fig. 12From: Resource allocation in a MAC with and without security via game theoretic learningF-MAC-WT: Comparison with existing schemesBack to article page