A study deals with daily activities on the Internet, which leave traces, and shows how these can be used to […]
Category: IT Security
Blockchain & Smart Contracts
This report explains different types of Blockchains as well as different consensus algorithms. Blockchain is a distributed ledger that consists […]
Rich End-to-End Encryption
This project discusses the requirements of a solution to decouple the authentication process from an application that uses the Skytrust […]
Citizen Card Encrypted (CCE)
CCE enables container-based encryption of files and folders. Encryption of data can be performed using smart-cards (hardware based keys, currently various versions of Austrian […]
Analysis of Browser-Extensions
This study deals with dangers potentially posed from browser extensions. Browser extensions can extend the functionality of modern web browsers […]
State of the Art Services for Direct Communication
Direct data transfer and direct communication services are becoming increasingly relevant due to widespread availability of high bandwidth Internet connections. […]
Security Aspects of Web-APIs
Analysis on the state of security of popular Web-API frameworks. Web-APIs represent a significant building block of the modern Web. […]
Browser Addon for Certificate Validation using EU Trust Lists
Intended for demonstration purposes, A-SIT realised an addon for Mozilla Firefox capable of verifying and displaying the trust status of […]
Decentralisation of Centralised Services
The project demonstrates how standard services relying on centralised infrastructure might employ decentralised paradigms. A proof-of-concept demonstrator to decentralise e-mail […]
Flexible Communication using Cross Platform and Web Technologies
Although web technologies, such as those that can be used in web applications and cross-platform applications, provide the necessary tools […]