With this procedure it is not possible to prevent a violation of integrity or authenticity of the message (i.e. changing content or presumed author or sender of the message), but it is possible to detect any such violation as in the case of using digital signatures over large networks.