5.1 Security Considerations for Implementers

This protocol does not use any additional security mechanisms.

Show: