Certificate Transparency for Relying Party Certificates
eIDAS 2’s European Digital Identity framework shifts control to the user via a secure wallet app. Relying Parties (RPs) willing…
eIDAS 2’s European Digital Identity framework shifts control to the user via a secure wallet app. Relying Parties (RPs) willing…
This report examines the performance of four modern AI-based coding agents in modernising existing applications. The aim is to upgrade…
Binary transparency is a security practice that ensures software binaries are verifiable and have not been tampered with. It aims…
The A-SIT SSL/TLS tool tests the security properties of Web browsers and Web Servers. The A-SIT SSL/TLS tool consists of […]
CCE enables container-based encryption of files and folders. Encryption of data can be performed using smart-cards (hardware based keys, currently various versions of Austrian […]