Part 2 of Security In bada Applications

Following on from Part One, Part Two of  Security in bada Applications looks at Digital Signatures and Hashes - Quite a challenging subject, we continue with the classic Alice & Bob scenario, with Eve still running the interference (why can't she just let them live in peace?!). Check out the video after the jump or click here to view it on You Tube. Also worth mentioning is that we are going to make the source code available for the test project used in the video - under a new section of the developer site potentially called "Samples" (Watch this space!)

Read more »

0 komentar:

Post a Comment

  • Digg
  • del.icio.us
  • StumbleUpon
  • Yahoo! Buzz
  • Technorati
  • Facebook
  • TwitThis
  • MySpace
  • LinkedIn
  • Google
  • Reddit
  • Netvibes
Design by Blogger Tune-UpCopyright © 2011 Gadget Reviews Update 2012 | Powered by Blogger