| http://www.w3.org/ns/prov#value | - re the second user initiates the call, receiving a message from the first user, the message including an indication of the secret identification number (SI1) of the first user and the public identification number (PI2) of the second user; and using the information obtained in the accessing and receiving substeps to derive a known mapping between the secret identification number of the second user
|