Fig. 5From: Resource allocation and network pricing based on double auction in mobile edge computingBuyer and seller authenticityBack to article page