Security and Privacy Aspects of AI-based E-Government Services The public sector is increasingly adopting AI-based e-government services as they reduce […]
Category: IT Security
Conclusions from SSI applied in a Trust Policy Language
Since digitization means that more and more transactions in both the public and private sectors are being carried out electronically, […]
Areas of Application for Artificial Intelligence in Austrian E-Government
In Austria, the provision of e-government services currently requires the use of human resources, mostly on the part of the […]
Cryptographic Access Protection: Transformation from Interactive to Non-Interactive Proxy Re-Encryption
Cloud services made it possible for users to conveniently store their data in the cloud and share it with other […]
Secure Edge Computing Technologies
Complex tasks are often outsourced to the cloud because many small and mobile devices do not have the necessary computing […]
On-Device Patching Framework for Android Applications
Patching existing Android packages has a broad range of applications, ranging from fixing security vulnerabilities to instrumenting potential malware, or […]
Cross-User Security on Android
This report takes a closer look at the security of the isolation between different user accounts on Android. In particular, […]
Whitepaper APIs in E-Government (DE)
Application Programming Interfaces, or APIs for short, enable the provision of web services and data via machine-readable interfaces while restricting […]
Challenges of Encyption: Recovery and Computation
Encryption represents a fundamental tool to protect the confidentiality of sensitive data, such as identity attributes, medical data, and digital […]
Automatic Detection and Mitigation of Crypto API Misuse in Android Applications
Almost a decade after its first scientific discussion, crypto API misuse remains one of the most common security flaws in […]