Summary


In this chapter we looked at the two major cryptographic operations that can be applied to XML data. The first half of this chapter focused on XML encryption, and the second half focused on XML signatures.



.NET Security and Cryptography
.NET Security and Cryptography
ISBN: 013100851X
EAN: 2147483647
Year: 2003
Pages: 126

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net