Release of 25.09.2013
How should data be transferred in a mobile network? Which system components are particularly important? Which security measures should be taken into account for M2M? The article published in GIT Newsletter outlines the architectural set-up of secure M2M communication.
To view the article (DE) written by Christian Kantner, Information Security & Emergency, Telekom Austria AG , please click here.