Login / Signup
Security Threats and Requirements for Emergency Call Marking and Mapping.
Tom Taylor
Hannes Tschofenig
Henning Schulzrinne
Murugaraj Shanmugam
Published in:
RFC (2008)
Keyphrases
</>
security threats
security issues
security mechanisms
key management
decision making
management system
security risks
data sets
information security
real time
databases
power consumption
ad hoc networks
sensitive data
resource constrained