- presentation of a credential to the e-Government service, and checking of
that credential by the e-Government service (or by a trusted third-party on behalf
of the service) to verify the client's electronic identity.
86 For example, the intrinsic strength of a cryptographic key wil depend on the key length and the algorithm
used, and on the complexity of any pin, password or passphrase that protects it.
[Fig 7 deleted]
Email this to a friend.
Previous item —
Next item.