rddp-5----Page:3
1  2  3  4  5  6  7  8  9  10  11  12  13  14  15  16  17  18  19  20 

Approach
Security analysis not constrained to any one implementation – examine the scope of implementations
The draft is relatively new – minimal review
Still sections left to be written


PPT Version