Fig. 4From: Global experimental verification of Docker-based secured mVoIP to protect against eavesdropping and DoS attacksConcept diagram of the registration and deployment of a secure mVoIP serviceBack to article page