August 2003
Intermediate to advanced
496 pages
11h 59m
English
In this chapter we looked at the two major cryptographic operations that can be applied to XML data. The first half of this chapter focused on XML encryption, and the second half focused on XML signatures.
Read now
Unlock full access