commentonthis

About CommentOnThis.com

This is a site designed to make it easier to take the core of large published reports and allow anyone to comment on them.

More...

Send the page:

  • presentation of a credential to the e-Government service, and checking of that credential by the e-Government service (or by a trusted third-party on behalf of the service) to verify the client's electronic identity. 86 For example, the intrinsic strength of a cryptographic key wil depend on the key length and the algorithm used, and on the complexity of any pin, password or passphrase that protects it. [Fig 7 deleted]

To: Email address:
 
Your details: Email address:
Name:
Message: