Skip to content Skip to Navigation
A-SIT Technologie

Main Navigation

  • About A-SIT
  • License Agreement
  • Sitemap
  • Deutsch
  • English
  • eID & eSignature
  • eGovernment
  • Mobile & Cloud
  • IT Security
  • Software
    • Open Source Modules
    • Services
    • Tools
  • Archive
Home IT Security

Category: IT Security

Certificate Transparency for Relying Party Certificates

posted in #eGovernment, eID & eSignature, IT Security, News on the 27.08.2025

eIDAS 2’s European Digital Identity framework shifts control to the user via a secure wallet app. Relying Parties (RPs) willing […]

Analysis of Possible Applications of AI in Code Refactoring

posted in #eGovernment, IT Security, Software on the 31.07.2025

This report examines the performance of four modern AI-based coding agents in modernising existing applications. The aim is to upgrade […]

Wallet Binary Transparency

posted in #eGovernment, eID & eSignature, IT Security, News on the 24.06.2025

Binary transparency is a security practice that ensures software binaries are verifiable and have not been tampered with. It aims […]

Implementation and Evaluation of the Digital Credentials API

posted in #IT Security, Mobile & Cloud on the 16.06.2025

The Digital Credentials API is currently being developed as part of the Web Incubator Community Group (WICG). The programing interface […]

Split-View Attack Protection for Transparency Systems

posted in #IT Security, News on the 27.02.2025

Transparency Systems, such as Certificate Transparency or Key Transparency, are designed to provide accountability and verifiability of data. However, they […]

Security Analysis of Native Cryptography in Android Apps

posted in #IT Security, Mobile & Cloud on the 10.02.2025

Although Android apps are primarily developed in Java and compatible languages for portability reasons, there is the possibility of implementing […]

Authenticity & Verifiability in Federated Learning: Overview & Methods

posted in #IT Security, News, Privacy-Preserving Computation on the 22.01.2025

With the help of machine learning (ML) – or often referred to as AI – and a large amount of […]

Federated Credential Management (FedCM API)

posted in #eID & eSignature, IT Security on the 23.12.2024

Browsers are introducing measures to improve user privacy. For example,in the future, users will be prevented from being tracked via […]

Design Considerations of Ex-post TETs for Credential Transparency

posted in #eGovernment, eID & eSignature, IT Security, News on the 21.11.2024

Ex-post Transparency-Enhancing-Technologies aim to help data subjects exercise their right to transparency by providing them with visibility on the sensitive […]

Analysis of Fingerprinting Libraries on Android

posted in #IT Security, Mobile & Cloud on the 30.09.2024

In order to recognise a user across different applications, a fingerprint of the used device can be created. Specialised software […]

Posts navigation

Older posts
Categories
  • Archive
  • eGovernment
  • eID & eSignature
  • IT Security
    • Privacy-Preserving Computation
  • Mobile & Cloud
  • News
  • Software
    • Open Source Modules
    • Services
    • Tools
  • Home
  • About A-SIT
  • Imprint
  • Data Protection
  • Contact