| http://www.w3.org/ns/prov#value | - On the other hand, in the case where there is a need for the shared library 4 to authenticate the program 3, a pair of the public key and the secret key is given to the program 3 in advance, and the public key of the program 3 is distributed to the creator of the shared library 4 in advance.
|