| http://www.w3.org/ns/prov#value | - The method of the operation uses various cryptographic techniques including symmetric (secret key) and asymmetric (public key) cryptography, secure key exchange, one-way hash functions (including keyed hash functions known as MACs), random number generation, and other techniques well known to those skilled in the art.
|