PropertyValue
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
http://www.w3.org/ns/prov#value
  • Cryptographic protocols that may be used include a public-key algorithm (e.g., the ElGamal message authentication code); a one-way hash function algorithm (e.g., a secure hash algorithm such as SHA-1); and a key exchange algorithm (e.g., the Diffie-Hellman algorithm).
http://www.w3.org/ns/prov#wasQuotedFrom
  • google.com