Split-View Attack Protection for Transparency Systems
Transparency Systems, such as Certificate Transparency or Key Transparency, are designed to provide accountability and verifiability of data. However, they…
Transparency Systems, such as Certificate Transparency or Key Transparency, are designed to provide accountability and verifiability of data. However, they…
Although Android apps are primarily developed in Java and compatible languages for portability reasons, there is the possibility of implementing…
With the help of machine learning (ML) - or often referred to as AI - and a large amount of…
The A-SIT SSL/TLS tool tests the security properties of Web browsers and Web Servers. The A-SIT SSL/TLS tool consists of […]
CCE enables container-based encryption of files and folders. Encryption of data can be performed using smart-cards (hardware based keys, currently various versions of Austrian […]