Fig. 5From: Resource allocation in a MAC with and without security via game theoretic learningF-MAC: sum-rate comparison for our scheme vs existing schemesBack to article page