Help: This page shows how the referencing vocabulary definitions are maintained and interlinked for controlled consistency of documentation. Click on the hyperlinks to see how the terms are defined within the Askemos architecture. moreā€¦ Tip: Remember the back-button!

This page has three main sections. (Note that the listings could be empty.)

  1. The first item displays a term, URL, text or picture.
  2. Followed by a (still unordered) listing of statements about this subject. (for details follow ">"-link)
  3. Separated by a horizontal rule a "reverse" listing of statements referring to this item in object position.
Cryptographic hash function
1944 is subclass of > Cryptography
1947 is a > Prima facie (proof)
1950 description > take a message of any length as input, and output a short, fixed length value, the "hash".

Merkle tree kind/genre/type
OID adheres to
Ricardian Hash adheres to
Data integrity best practice
WebID best practice