Skip to main content
5.1 Security Considerations for Implementers

This protocol has no additional security considerations beyond what is described in [MS-RTP] and [MS-SRTP].