| http://www.w3.org/ns/prov#value | - Further, the authenticating method of the present invention is a method, in which: the client apparatus includes a hash algorithm identifier storage in which a list of hash algorithm identifiers has been stored that are usable in the above client apparatus; the server apparatus includes a hash algorithm intensity storage in which an intensity of the hash algorithm has been stored that corresponds
|