Women in Technology

Hear us Roar



Article:
  The Secrets of Strong Naming
Subject:   Figure 3 is correct
Date:   2003-07-27 20:28:48
From:   anonymous2
Response to: Figure 3 is correct

The point the previous poster tried to make was that the arrow from the hash to the public key and then into the assembly makes it look like the hash is modified with the public key and stored in the assembly.