Recently, manipulated USB devices have appeared that can not be detected as a threat to current protection measures. This short […]
Category: IT Security
Secure Peer-to-Peer communication
This project proposes a flexible and modular approach for existing peer-to-peer frameworks to enable a secure communication using well-established and […]
Analyzing HTTPS services offered by GV.AT domains
In this project several properties of the services offered by gv.at domains have been analyzed. The main emphasis of the analysis was placed […]
Create and decode CMS in Javascript
This project implements a demo that provides encryption and decryption in a browser using CMS. As the report of this […]
Alternative Two-Factor Authentication
Two-factor authentication (2FA) is an essential mechanism that enables secure access to remote services. The Austrian Citizen Card is only […]
Mail Test
A utility for checking how email clients handle various types of emails Standard email clients usually behave differently with encrypted […]