6.4.7 Security
For more details on the security key exchange in a centralized network between the trust center and end device, refer to 6.2.5 Security.
For more details on the security key exchange in a centralized network between the trust center and end device, refer to 6.2.5 Security.
The online versions of the documents are provided as a courtesy. Verify all content and data in the device’s PDF documentation found on the device product page.