| http://www.w3.org/ns/prov#value | - To authorize a node to send a message from A to B, A gives another key KA to the node, for example N. It will be appreciated that to each key, K, there is a corresponding encryption method EK which involves application some number of times of the dynamical system described by K. To send a message M to B. A first encrypts with EK and then with EK.sbsb.A. The encryption with EK is initialized with t
|