Return to Article Details Authentication of Digital Objects: lessons from a Historian's Research Download Download PDF