TPMv2 Analysis

posted in #IT Security on the 4.03.2015

The “Trusted Computing” technology offers interesting  concepts and methods to increase the trustworthiness of connected systems. By adding a new component […]

Secure Peer-to-Peer communication

posted in #IT Security on the 12.11.2014

This project proposes a flexible and modular approach for existing peer-to-peer frameworks to enable a secure communication using well-established and […]

Mail Test

posted in #eID & eSignature, IT Security on the 22.08.2008

A utility for checking how email clients handle various types of emails Standard email clients usually behave differently with encrypted […]