.NET Security and Cryptography
In this chapter we looked at the two major cryptographic operations that can be applied to XML data. The first half of this chapter focused on XML encryption, and the second half focused on XML signatures. |
In this chapter we looked at the two major cryptographic operations that can be applied to XML data. The first half of this chapter focused on XML encryption, and the second half focused on XML signatures. |