Browse by Tags

Tagged Content List
  • Blog Post: What's the Difference, Part Five: certificate signing vs strong naming

    Both strong naming and digital signatures use public key cryptography to provide evidence about the origin of an assembly, so that you can apply security policy to determine what permissions are granted to the assembly . They differ most importantly not in their mathematical details, but in what problems...
Page 1 of 1 (1 items)