A computer system includes an interface and a processor. The interface is
adapted to receive a request from another computer system for
identification of the first computer system. The adapter also furnishes a
hash value that identifies the first computer system to the other
computer system. The processor is coupled to the interface and is adapted
to encrypt an identifier that identifies the first computer system with a
key associated with the other computer system to provide the hash value.