Browse by Tags

Tagged Content List
  • Blog Post: Keep it secret, keep it safe

    A lot of people really love the idea of cryptography. To computer geeks like us there is nothing cooler than the idea that computing relatively simple arithmetic on a message can enable you to communicate secretly with anyone in the world, even if there are eavesdroppers. Unfortunately, this means that...
  • Blog Post: What's the Difference, Part Five: certificate signing vs strong naming

    Both strong naming and digital signatures use public key cryptography to provide evidence about the origin of an assembly, so that you can apply security policy to determine what permissions are granted to the assembly . They differ most importantly not in their mathematical details, but in what problems...
Page 1 of 1 (2 items)