Fig. 6From: Resource allocation in a MAC with and without security via game theoretic learningSum rate with security constraints: comparison of CCE, PP and NBS at fixed transmission rate (with CSI of Eve)Back to article page