Automated analysis tools have been able to find numerous vulnerabilities and problems in mobile operating systems. However, the existing analysis […]
News
Security and Privacy Aspects of AI-based E-Government Services
Security and Privacy Aspects of AI-based E-Government Services The public sector is increasingly adopting AI-based e-government services as they reduce […]
Conclusions from SSI applied in a Trust Policy Language
Since digitization means that more and more transactions in both the public and private sectors are being carried out electronically, […]
Areas of Application for Artificial Intelligence in Austrian E-Government
In Austria, the provision of e-government services currently requires the use of human resources, mostly on the part of the […]
Cryptographic Access Protection: Transformation from Interactive to Non-Interactive Proxy Re-Encryption
Cloud services made it possible for users to conveniently store their data in the cloud and share it with other […]
Secure Edge Computing Technologies
Complex tasks are often outsourced to the cloud because many small and mobile devices do not have the necessary computing […]
On-Device Patching Framework for Android Applications
Patching existing Android packages has a broad range of applications, ranging from fixing security vulnerabilities to instrumenting potential malware, or […]
PDF-Over
How does it work PDF-Over is your tool for frequent & efficient PDF signing. Configured according to your individual needs, […]
Cross-User Security on Android
This report takes a closer look at the security of the isolation between different user accounts on Android. In particular, […]
Whitepaper APIs in E-Government (DE)
Application Programming Interfaces, or APIs for short, enable the provision of web services and data via machine-readable interfaces while restricting […]