| http://www.w3.org/ns/prov#value | - Public-key and other forms of cryptography are detailed in ???Applied Cryptography, Second Edition: Protocols, Algorithms, and Source Code in C,??? by Bruce Schneier (1997), particularly at pages 483???502, which is incorporated herein by reference.
|