Fig. 2From: Resource allocation in a MAC with and without security via game theoretic learningFairness comparison for FMAC fixed rateBack to article page