Skip to content Skip to Navigation
A-SIT Technologie

Main Navigation

  • About A-SIT
  • License Agreement
  • Sitemap
  • Deutsch
  • English
  • eID & eSignature
  • eGovernment
  • Mobile & Cloud
  • IT Security
  • Software
    • Open Source Modules
    • Services
    • Tools
  • Archive
Home IT Security (: Seite 5)

Category: IT Security

Areas of Application for Artificial Intelligence in Austrian E-Government

posted in #eGovernment, IT Security on the 6.06.2022

In Austria, the provision of e-government services currently requires the use of human resources, mostly on the part of the […]

Cryptographic Access Protection: Transformation from Interactive to Non-Interactive Proxy Re-Encryption

posted in #IT Security, Mobile & Cloud on the 28.03.2022

Cloud services made it possible for users to conveniently store their data in the cloud and share it with other […]

Secure Edge Computing Technologies

posted in #IT Security, Mobile & Cloud on the 14.01.2022

Complex tasks are often outsourced to the cloud because many small and mobile devices do not have the necessary computing […]

On-Device Patching Framework for Android Applications

posted in #IT Security, Mobile & Cloud on the 21.12.2021

Patching existing Android packages has a broad range of applications, ranging from fixing security vulnerabilities to instrumenting potential malware, or […]

Cross-User Security on Android

posted in #IT Security, Mobile & Cloud on the 25.10.2021

This report takes a closer look at the security of the isolation between different user accounts on Android. In particular, […]

Whitepaper APIs in E-Government (DE)

posted in #eGovernment, IT Security on the 15.10.2021

Application Programming Interfaces, or APIs for short, enable the provision of web services and data via machine-readable interfaces while restricting […]

Challenges of Encyption: Recovery and Computation

posted in #IT Security, Mobile & Cloud, News on the 4.10.2021

Encryption represents a fundamental tool to protect the confidentiality of sensitive data, such as identity attributes, medical data, and digital […]

Automatic Detection and Mitigation of Crypto API Misuse in Android Applications

posted in #IT Security, Mobile & Cloud on the 20.08.2021

Almost a decade after its first scientific discussion, crypto API misuse remains one of the most common security flaws in […]

Behavioral Authentication in Digitales-Amt-App

posted in #eGovernment, eID & eSignature, IT Security on the 26.07.2021

Biometric authentication has become one of the most widely used authentication methods, especially on smartphones and in the Digitales-Amt app. […]

Decentral Methods for Simultaneous Editing of Shared Data Structures

posted in #IT Security, Mobile & Cloud on the 23.07.2021

Systems such as Google Docs or web-based versions of Microsoft Office have been instrumental in driving collaborative document editing. Distributed […]

Posts navigation

Older posts
Newer posts
Categories
  • Archive
  • eGovernment
  • eID & eSignature
  • IT Security
    • Privacy-Preserving Computation
  • Mobile & Cloud
  • News
  • Software
    • Open Source Modules
    • Services
    • Tools
  • Home
  • About A-SIT
  • Imprint
  • Data Protection
  • Contact