4 Security Considerations

These structures require no security considerations beyond those of the protocols that utilize them.