Design Considerations of Ex-post TETs for Credential Transparency
Ex-post Transparency-Enhancing-Technologies aim to help data subjects exercise their right to transparency by providing them with visibility on the sensitive…
Ex-post Transparency-Enhancing-Technologies aim to help data subjects exercise their right to transparency by providing them with visibility on the sensitive…
As digitalization progresses, it is becoming increasingly attractive to learn from as much data as possible in order to, e.g.,…
In federated authentication protocols (e.g., OpenID Connect), users are often assigned unique identifiers to be identified by service providers (SPs).…
The A-SIT SSL/TLS tool tests the security properties of Web browsers and Web Servers. The A-SIT SSL/TLS tool consists of […]
CCE enables container-based encryption of files and folders. Encryption of data can be performed using smart-cards (hardware based keys, currently various versions of Austrian […]