Fig. 8From: Admission control policy and key agreement based on anonymous identity in cloud computingResponse time Analysis for the MARL-ACP method with the existing systemBack to article page