http://www.w3.org/ns/prov#value | - However, when the hashing takes relatively little time, such as 10 seconds for example, the process can repeat itself so that the data verification in RAM is in effect, continuous. [0061] The message digest 228 created from hashing the shared object is preferably encrypted.
|