Return to Issue Details PROTECTING THE CONFIDENTIALITY OF DATA TRANSMISSION AND RECEIPT AT THE SECURITY OPERATIONS CENTRE USING MACHINE-TO-MACHINE (M2M) COMMUNICATION METHODS Download Download PDF