Such systems include for instance, a system for secure electronic mail which might include methods for digital signatures, cryptographic hash functions, key management techniques, and so on.
The communications service used can optionally support other functions such as voice, electronic mail, and other applications over which the communications cost can be amortized.