Application should include examples such as

and their use in denying or enhancing security, integrity, courtesy, and confidentiality in information and communication systems and intellectual property.