GAP Security (Encryption) procedure

Example of central security (encryption) procedure

    

    

Example of peripheral security (encryption) procedure