Table of Contents |
---|
Overview
Data entry requires a signing key in order to establish that inputted data has come from an authenticable source. Authenticable entry items are identified by active identifiers.
...
Table of Contents |
---|
Data entry requires a signing key in order to establish that inputted data has come from an authenticable source. Authenticable entry items are identified by active identifiers.
...