Skip to content Skip to Navigation
A-SIT Technologie

Main Navigation

  • About A-SIT
  • License Agreement
  • Sitemap
  • Deutsch
  • English
  • eID & eSignature
  • eGovernment
  • Mobile & Cloud
  • IT Security
  • Software
    • Open Source Modules
    • Services
    • Tools
  • Archive

News

Wallet Binary Transparency

posted in #eGovernment, eID & eSignature, IT Security, News on the 24.06.2025

Binary transparency is a security practice that ensures software binaries are verifiable and have not been tampered with. It aims […]

Implementation and Evaluation of the Digital Credentials API

posted in #IT Security, Mobile & Cloud on the 16.06.2025

The Digital Credentials API is currently being developed as part of the Web Incubator Community Group (WICG). The programing interface […]

eIDAS Embedded Disclosure Policies

posted in #eID & eSignature on the 28.04.2025

Article 5a (Paragraph 5e) of the current eIDAS Regulation (“eIDAS 2”, 2024) introduces so-called Embedded Disclosure Policies. These allow an […]

Split-View Attack Protection for Transparency Systems

posted in #IT Security, News on the 27.02.2025

Transparency Systems, such as Certificate Transparency or Key Transparency, are designed to provide accountability and verifiability of data. However, they […]

Security Analysis of Native Cryptography in Android Apps

posted in #IT Security, Mobile & Cloud on the 10.02.2025

Although Android apps are primarily developed in Java and compatible languages for portability reasons, there is the possibility of implementing […]

Authenticity & Verifiability in Federated Learning: Overview & Methods

posted in #IT Security, News, Privacy-Preserving Computation on the 22.01.2025

With the help of machine learning (ML) – or often referred to as AI – and a large amount of […]

Federated Credential Management (FedCM API)

posted in #eID & eSignature, IT Security on the 23.12.2024

Browsers are introducing measures to improve user privacy. For example,in the future, users will be prevented from being tracked via […]

Design Considerations of Ex-post TETs for Credential Transparency

posted in #eGovernment, eID & eSignature, IT Security, News on the 21.11.2024

Ex-post Transparency-Enhancing-Technologies aim to help data subjects exercise their right to transparency by providing them with visibility on the sensitive […]

Analysis of Fingerprinting Libraries on Android

posted in #IT Security, Mobile & Cloud on the 30.09.2024

In order to recognise a user across different applications, a fingerprint of the used device can be created. Specialised software […]

MPC-based Secure Aggregation in Federated Learning: Overview, Protocols, & Google’s Gboard

posted in #IT Security, News, Privacy-Preserving Computation on the 26.09.2024

As digitalization progresses, it is becoming increasingly attractive to learn from as much data as possible in order to, e.g., […]

Posts navigation

Older posts
Categories
  • Archive
  • eGovernment
  • eID & eSignature
  • IT Security
    • Privacy-Preserving Computation
  • Mobile & Cloud
  • News
  • Software
    • Open Source Modules
    • Services
    • Tools
  • Home
  • About A-SIT
  • Imprint
  • Data Protection
  • Contact