This is a site designed to make it easier to take the core of large published reports and allow anyone to comment on them.


  • presentation of a credential to the e-Government service, and checking of that credential by the e-Government service (or by a trusted third-party on behalf of the service) to verify the client's electronic identity. 86 For example, the intrinsic strength of a cryptographic key wil depend on the key length and the algorithm used, and on the complexity of any pin, password or passphrase that protects it. [Fig 7 deleted]

Email this to a friend.
Previous itemNext item.


(You must give a valid email address, but it will not be displayed to the public.)

We only allow the following html tags em strong blockquote p br. After posting, there may be a short delay before your comment appears on the site