Help: This page shows how the referencing vocabulary definitions are maintained and interlinked for controlled consistency of documentation. Click on the hyperlinks to see how the terms are defined within the Askemos architecture. more… Tip: Remember the back-button!

This page has three main sections. (Note that the listings could be empty.)

  1. The first item displays a term, URL, text or picture.
  2. Followed by a (still unordered) listing of statements about this subject. (for details follow ">"-link)
  3. Separated by a horizontal rule a "reverse" listing of statements referring to this item in object position.
1921 ↑ ... is defined by > Askemos Terms
1925 is a > programming paradigm
1929 subject (keyword) > Non-Repudiation
1936 subject (keyword) > Data integrity
1924 description > Protocols that overcome the influence of adversaries and wich are related to various aspects in information security such as data confidentiality, data integrity, authentication, and non-repudiation.
1939 see URL >

Cryptographic hash function is subclass of
Cryptographic encoding is subclass of
Consensus protocol is subclass of