Monday, January 24, 2011

Part 2 of Security In bada Applications

Following on from Part One, Part Two of  Security in bada Applications looks at Digital Signatures and Hashes - Quite a challenging subject, we continue with the classic Alice & Bob scenario, with Eve still running the interference (why can't she just let them live in peace?!). Check out the video after the jump or click here to view it on You Tube. Also worth mentioning is that we are going to make the source code available for the test project used in the video - under a new section of the developer site potentially called "Samples" (Watch this space!)

Read more »

No comments:

Post a Comment