http://www.w3.org/ns/prov#value | - ism used to protect against unauthorized access of emails in accordance with an exemplary embodiment of the present invention; FIG. 10 is a simplified block diagram illustrating an exemplary application in accordance with the present invention; FIG. 11 is an example of another embodiment of the present invention; FIG. 12 is an example of another embodiment of the present invention; FIG. 13 is a bl
|