urity/
Entire sentenced has been rewritten
The deployment of DMM using existing IP mobility protocols raises
similar security threats as those encountered in centralized mobility
management systems.
H Anthony Chan
From: Elwyn Davies
Sent: Thursday, September 18, 2014 12:00 PM
T
Russ,
Thanks and I will delete the first EPC.
H Anthony Chan
From: Russ Housley
Sent: Friday, March 21, 2014 4:03 PM
To: draft-ietf-dmm-requirements@tools.ietf.org
Cc: IESG ; IETF Gen-ART
Subject: Gen-ART review of draft-ietf-dmm-requirements-15
I am the assigned Gen-ART reviewer for
Section 1.
WLAN is also spelled out.
H Anthony Chan
From: Russ Housley
Sent: Monday, February 10, 2014 1:51 PM
To: draft-ietf-dmm-requirements@tools.ietf.org
Cc: IESG ; IETF Gen-ART
Subject: Gen-ART review of draft-ietf-dmm-requirements-14
I am the assigned Gen-ART reviewer for this