| http://www.w3.org/ns/prov#value | - Hash functions and the corresponding hash values they generate may be used not only to uniquely identify a packet, but also to provide authentication and verification of a packet, document or other information associated with a hash value.
|