Fig. 4From: Resource allocation in a MAC with and without security via game theoretic learningFairness comparison for F-MAC: multiple transmission ratesBack to article page