Securing prioritised emergency traffic
Threats
Content security
Which protocols where?
Preventing theft of service
Gateway support
User verification
VoIP scenarios
Summary