Page tree
Skip to end of metadata
Go to start of metadata

This section describes guidelines for implementing/integrating Encrypted Identities and Pseudonyms within your application environment.


2a. BSNk Decryptiecomponent integration
The section outlines considerations regarding integration of the BSNk Decryptiecomponent.

2a. BSNk Decryptiecomponent integration

2b. Working with pseudonyms
This section contains information about pseudonyms and implementation recommendations for processing pseudonyms.

2b. Working with pseudonyms


2c. Source-code and Documentation

This section contains testscenario's, testdata, sourcecode and documentation for BSNk Decryptiecomponent.

2c. Source-code and Documentation


  • No labels