Fig. 1From: Admission control policy and key agreement based on anonymous identity in cloud computingThe proposed method of MARL-ACPBack to article page