<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet type='text/xsl' href='https://technology.a-sit.at/wp-content/plugins/google-sitemap-generator/sitemap.xsl'?><!-- sitemap-generator-url='http://www.arnebrachhold.de' sitemap-generator-version='4.1.21' -->
<!-- generated-on='17. October 2025 12:05' -->
<urlset xmlns:xsi='http://www.w3.org/2001/XMLSchema-instance' xsi:schemaLocation='http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd' xmlns='http://www.sitemaps.org/schemas/sitemap/0.9'>	<url>
		<loc>https://technology.a-sit.at/en/smime-mail-container-en/</loc>
		<lastmod>2018-02-18T10:43:10+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/smime-mail-container/</loc>
		<lastmod>2019-09-08T18:21:03+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/word-signatur/</loc>
		<lastmod>2020-04-11T09:59:20+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/word-signature/</loc>
		<lastmod>2019-09-08T18:17:59+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/behaviour-blocker/</loc>
		<lastmod>2018-04-02T08:38:41+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/behaviour-blocker-2/</loc>
		<lastmod>2018-04-02T08:38:18+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/secureefs-file-system-encryption-with-the-citicen-card/</loc>
		<lastmod>2019-09-08T18:21:05+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/secureefs-dateisystemveschluesselung-mit-buergerkarte/</loc>
		<lastmod>2019-09-08T18:21:05+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/dkim-proxy-2/</loc>
		<lastmod>2018-02-19T09:53:22+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/dkim-proxy/</loc>
		<lastmod>2018-02-19T09:50:57+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/security-layer-new-selan/</loc>
		<lastmod>2018-02-18T10:54:22+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/security-layer-neu-selan/</loc>
		<lastmod>2018-02-18T10:54:10+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/testnormal-bku/</loc>
		<lastmod>2018-01-31T09:02:51+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/testnormal-bku-2/</loc>
		<lastmod>2018-02-18T11:20:26+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/circular-resolution-database/</loc>
		<lastmod>2018-02-18T20:07:59+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/beschluss-datenbank/</loc>
		<lastmod>2018-02-18T20:07:23+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/mail-test-2/</loc>
		<lastmod>2020-04-11T10:03:26+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/mail-test/</loc>
		<lastmod>2020-04-11T10:00:44+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/open-office-signatur/</loc>
		<lastmod>2019-09-08T18:21:04+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/open-office-signature/</loc>
		<lastmod>2018-02-18T11:10:31+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/signature-verification-tool/</loc>
		<lastmod>2020-08-25T12:08:59+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/signaturpruefservice/</loc>
		<lastmod>2020-08-25T12:08:34+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/smart-card-applet-en/</loc>
		<lastmod>2018-02-23T11:35:08+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/smart-card-applet/</loc>
		<lastmod>2018-02-23T11:35:27+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/cloud-elemente-signatur/</loc>
		<lastmod>2018-02-18T11:15:56+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/cloud-elemente-signatur-en/</loc>
		<lastmod>2018-02-19T10:03:41+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/sicherheitsanalyse-mobile-plattformen/</loc>
		<lastmod>2018-02-18T21:59:37+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/security-analysis-of-current-smartphone-platforms/</loc>
		<lastmod>2018-02-18T21:59:16+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/alternative-two-factor-authentication/</loc>
		<lastmod>2018-02-18T20:13:55+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/alternative-zweifaktorauthentifizierung/</loc>
		<lastmod>2018-02-18T20:11:30+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/create-and-decode-cms-in-javascript/</loc>
		<lastmod>2018-02-19T17:04:50+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/cms-javascript/</loc>
		<lastmod>2018-02-19T17:24:20+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/cloud-basierte-signaturloesungen-eine-studie/</loc>
		<lastmod>2018-02-16T21:09:49+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/cloud-based-signature-solutions-a-survey/</loc>
		<lastmod>2018-02-16T21:06:27+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/https-analyse-von-gv-at-domaenen/</loc>
		<lastmod>2018-02-19T12:10:50+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/analyzing-https-services/</loc>
		<lastmod>2018-02-19T12:15:06+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/secure-peer-to-peer-communication/</loc>
		<lastmod>2018-02-19T17:29:28+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/peer-to-peer-sichere-kommunikation/</loc>
		<lastmod>2018-02-19T17:28:52+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/bedrohung-durch-manipulierte-usb-geraete/</loc>
		<lastmod>2018-02-19T17:31:48+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/malicious-usb-devices/</loc>
		<lastmod>2018-02-19T17:33:26+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/citizen-card-plugin-for-keepass/</loc>
		<lastmod>2018-02-18T20:35:05+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/buergerkarten-plugin-fuer-keepass/</loc>
		<lastmod>2018-02-18T20:28:00+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/cloud-based-mobile-augmentation-systems/</loc>
		<lastmod>2018-02-18T22:04:30+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/cloud-based-mobile-augmentation-systeme/</loc>
		<lastmod>2018-02-18T22:04:48+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/eid-in-the-cloud-with-scim/</loc>
		<lastmod>2018-02-18T20:39:44+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/eid-in-der-cloud-mit-scim/</loc>
		<lastmod>2018-02-18T20:40:11+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/tpmv2-analyse/</loc>
		<lastmod>2018-02-19T14:33:02+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/tpmv2-analyse-2/</loc>
		<lastmod>2018-02-19T14:32:16+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/analysis-of-windows-phone-applications/</loc>
		<lastmod>2018-02-19T13:48:30+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/analyse-von-windows-phone-applikationen/</loc>
		<lastmod>2018-02-18T22:07:38+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/apache-cordova-kryptographie-plugin/</loc>
		<lastmod>2020-04-11T09:57:26+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/apache-cordova-cryptography-plugin/</loc>
		<lastmod>2020-04-11T09:57:26+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/firefox-plugin-zur-anzeige-von-sicherheitsinfos/</loc>
		<lastmod>2018-02-19T18:02:12+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/firefox-plugin-highlighting-security-information/</loc>
		<lastmod>2018-02-19T17:47:50+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/analyse-spezifischer-android-applikationen/</loc>
		<lastmod>2018-02-18T22:21:36+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/static-analysis-of-selected-android-applications/</loc>
		<lastmod>2018-02-18T22:20:49+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/platformunabhaengiges-cma-system/</loc>
		<lastmod>2018-02-19T14:43:06+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/platform-independent-cma-system/</loc>
		<lastmod>2018-02-18T22:27:29+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/browser-plugin-zur-interaktion-mit-skytrust/</loc>
		<lastmod>2018-02-18T22:29:40+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/browser-plugin-to-interact-with-skytrust/</loc>
		<lastmod>2018-02-18T22:29:15+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/static-analysis-of-windows-phone-applications/</loc>
		<lastmod>2018-02-19T11:53:25+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/statische-analyse-von-windows-phone-applikationen/</loc>
		<lastmod>2018-02-19T11:54:17+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/analyse-aktueller-frameworks-zur-entwicklung-von-mobilen-cross-plattform-applikationen/</loc>
		<lastmod>2018-02-13T14:13:03+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/analysis-of-modern-cross-platform-development-frameworks-for-mobile-applications/</loc>
		<lastmod>2018-02-18T22:35:35+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/multidimensionale-informationssicherheitsrichtlinien/</loc>
		<lastmod>2018-02-18T22:45:02+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/multidimensional-security-policies/</loc>
		<lastmod>2018-02-18T22:46:05+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/ssl-check-clientsserver-2/</loc>
		<lastmod>2022-02-14T13:51:33+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/ssl-check-clientsserver/</loc>
		<lastmod>2022-02-14T13:50:56+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/security-recommendations-for-the-public-sector/</loc>
		<lastmod>2018-02-19T09:42:21+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/sicherheitsempfehlungen-fuer-behoerden/</loc>
		<lastmod>2018-02-19T09:41:40+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/security-implications-of-emerging-web-technologies/</loc>
		<lastmod>2018-02-19T22:03:59+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/privatsphaere-auswirkungen-neuer-web-technologien/</loc>
		<lastmod>2018-02-19T22:05:46+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/sichere-integration-in-der-cloud/</loc>
		<lastmod>2018-02-19T14:42:23+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/secure-integration-in-the-cloud/</loc>
		<lastmod>2018-02-19T14:42:40+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/moeglichkeiten-ontologie-basierter-konzepte-im-e-government/</loc>
		<lastmod>2018-02-17T10:25:00+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/ontologies-in-the-e-government-domain/</loc>
		<lastmod>2018-02-17T10:24:28+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/managing-security-of-api-based-integration-workflows/</loc>
		<lastmod>2018-02-18T23:11:05+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/benutzerzentriertes-sicherheitsmanagement-von-api-basierten-datenaustausche/</loc>
		<lastmod>2018-02-19T11:55:30+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/certificate-status-application/</loc>
		<lastmod>2020-08-25T12:16:02+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/zertifikats-status/</loc>
		<lastmod>2020-08-25T12:16:18+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/dynamische-schluesselverwendungsrichtlinien/</loc>
		<lastmod>2018-02-13T14:21:38+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/dynamic-key-usage-policies/</loc>
		<lastmod>2018-02-18T23:15:11+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/serverloesungen-zu-cloud-based-mobile-augmentation/</loc>
		<lastmod>2018-01-30T12:44:13+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/server-side-solutions-for-cloud-based-mobile-augmentation/</loc>
		<lastmod>2018-01-30T12:48:32+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/flexible-two-factor-authentication-with-fido/</loc>
		<lastmod>2018-02-19T22:18:49+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/flexible-zweifaktor-authentifizierung-mit-fido/</loc>
		<lastmod>2018-02-19T22:27:23+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/kontextbezogener-datenaustausch/</loc>
		<lastmod>2018-02-17T10:29:25+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/contextual-data-exchange/</loc>
		<lastmod>2018-02-01T08:28:34+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/analyse-von-fahrzeug-apps/</loc>
		<lastmod>2018-02-19T21:50:55+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/analysis-of-car-applications/</loc>
		<lastmod>2018-02-19T21:53:55+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/technologieueberblick-blockchain/</loc>
		<lastmod>2018-04-24T08:04:27+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/technology-overview-blockchain/</loc>
		<lastmod>2018-04-24T08:03:22+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/orchestration-von-verteilten-cloud-anwendungen/</loc>
		<lastmod>2018-02-19T13:56:21+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/orchestration-of-distributed-cloud-applications/</loc>
		<lastmod>2018-02-19T13:54:01+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/ca-lose-authentifizierung-von-clouddiensten/</loc>
		<lastmod>2018-02-19T11:59:51+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/ca-less-authentication-of-cloud-services/</loc>
		<lastmod>2018-02-19T12:00:58+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/static-analysis-of-ios-applications/</loc>
		<lastmod>2018-02-19T13:16:00+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/statische-analyse-von-ios-applikationen/</loc>
		<lastmod>2018-02-13T14:34:11+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/flexible-communication-using-cross-platform-and-web-technologies/</loc>
		<lastmod>2018-01-30T12:57:24+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/flexible-kommunikation-mit-cross-platform-und-web-technologien/</loc>
		<lastmod>2018-02-19T13:23:15+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/decentralisation-of-centralised-services/</loc>
		<lastmod>2018-02-19T14:03:21+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/dezentralisierung-zentralisierter-dienste/</loc>
		<lastmod>2018-02-19T14:02:00+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/automated-analysis-of-windows-phone-applications/</loc>
		<lastmod>2018-02-19T14:11:29+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/automatisierte-analyse-von-windows-phone-applikationen/</loc>
		<lastmod>2018-02-19T14:10:47+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/browser-addon-for-certificate-validation-using-eu-trust-status-lists-tsl/</loc>
		<lastmod>2018-02-19T14:40:18+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/browser-addon-zur-zertifikatspruefung-mit-eu-trust-status-lists-tsl/</loc>
		<lastmod>2018-02-19T14:39:55+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/security-aspects-web-apis/</loc>
		<lastmod>2018-02-19T14:14:10+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/sicherheitsaspekte-web-apis/</loc>
		<lastmod>2018-02-19T14:15:31+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/automated-reasoning-over-security-policies/</loc>
		<lastmod>2018-02-19T14:17:33+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/automatisierte-reasoning-ueber-sicherheitsrichtlinien/</loc>
		<lastmod>2018-02-19T14:17:49+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/soa-dir-komm/</loc>
		<lastmod>2018-02-19T22:35:32+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/state-of-the-art-services-for-direct-communication/</loc>
		<lastmod>2018-02-19T22:34:18+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/migrating-edge-computing-to-hybrid-edge-computing/</loc>
		<lastmod>2018-01-30T13:03:14+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/migration-von-edge-computing-zu-hybrid-edge-computing-verfahren/</loc>
		<lastmod>2018-01-30T21:54:22+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/analysis-of-browser-extensions/</loc>
		<lastmod>2018-02-19T22:47:24+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/analyse-von-browser-erweiterungen/</loc>
		<lastmod>2018-02-19T22:47:05+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/citizen-card-encrypted-cce/</loc>
		<lastmod>2020-08-25T12:11:14+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/citizen-card-encrypted-cce-2/</loc>
		<lastmod>2020-08-25T12:11:31+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/traffic-analysis-of-mobile-applications/</loc>
		<lastmod>2018-02-19T14:21:35+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/traffic-analyse-mobiler-anwendungen/</loc>
		<lastmod>2018-02-19T14:22:45+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/lod-and-lov-for-authorization-concepts/</loc>
		<lastmod>2018-02-19T14:00:57+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/lod-und-lov-fuer-autorisierungskonzepte/</loc>
		<lastmod>2018-02-19T14:01:37+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/rich-ende-zu-ende-verschluesselung/</loc>
		<lastmod>2018-02-20T04:24:44+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/rich-end-to-end-encryption/</loc>
		<lastmod>2018-02-20T04:26:03+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/blockchain-smartcontracts/</loc>
		<lastmod>2018-02-20T04:28:33+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/blockchain-smart-contracts/</loc>
		<lastmod>2018-02-20T04:29:41+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/spurenverwischung-im-internet/</loc>
		<lastmod>2018-02-20T04:33:12+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/traces-on-the-internet/</loc>
		<lastmod>2018-02-20T04:32:36+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/verwendung-von-policy-enforcement-systemen-zur-kontrolle-von-mobilen-verteilten-systemen/</loc>
		<lastmod>2018-02-17T11:53:23+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/utilizing-policy-enforcement-system-to-control-mobile-distributed-applications/</loc>
		<lastmod>2018-02-17T11:55:44+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/device-enrolment-using-flexible-authentication/</loc>
		<lastmod>2018-02-20T04:35:21+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/device-enrolment-mit-flexibler-authentifizierung/</loc>
		<lastmod>2018-02-20T04:34:46+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/fingerprinting-von-code-mobiler-anwendungen/</loc>
		<lastmod>2018-01-30T15:21:40+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/fingerprinting-code-of-mobile-applications/</loc>
		<lastmod>2018-02-19T14:24:59+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/sichere-echt-zeit-textkollaboration/</loc>
		<lastmod>2020-08-03T07:45:17+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/secure-real-time-textcollaboration/</loc>
		<lastmod>2020-08-03T07:45:50+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/multilaterale-integration-and-verwaltung-von-xacml/</loc>
		<lastmod>2018-02-19T12:06:33+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/multilateral-integration-of-xacml-policies/</loc>
		<lastmod>2018-02-19T12:05:25+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/android-browser-security-and-privacy/</loc>
		<lastmod>2018-02-19T14:27:57+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/android-browser-sicherheit-und-privatsphaere/</loc>
		<lastmod>2018-02-19T14:29:14+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/konsolidierung-von-skytrust-werkzeugen/</loc>
		<lastmod>2020-08-03T07:46:46+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/merging-skytrust-tools/</loc>
		<lastmod>2020-08-03T07:47:18+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/whitepaper-self-sovereign-identity/</loc>
		<lastmod>2021-01-19T08:14:02+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/whitepaper-selbstbestimmte-identitaet/</loc>
		<lastmod>2021-01-19T08:17:58+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/demonstrator-ibe-for-key-management/</loc>
		<lastmod>2020-08-03T07:48:42+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/demonstrator-ibe-zur-schluesselverwaltung/</loc>
		<lastmod>2020-08-03T07:48:01+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/secure-peer-to-peer-networking-based-on-self-certification/</loc>
		<lastmod>2018-05-07T09:33:06+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/sichere-peer-to-peer-netze-auf-basis-von-selbstzertifizierung/</loc>
		<lastmod>2018-05-07T09:33:16+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/iot-isolation-via-mini-router/</loc>
		<lastmod>2018-05-27T18:34:27+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/iot-isolation-ueber-mini-router/</loc>
		<lastmod>2018-05-27T18:35:57+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/overview-of-modern-cryptocurrencies/</loc>
		<lastmod>2018-06-19T06:15:26+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/ueberblick-moderne-kryptowaehrungen/</loc>
		<lastmod>2018-05-23T11:08:17+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/overview-on-e-voting/</loc>
		<lastmod>2018-06-19T06:16:21+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/ueberblick-e-voting/</loc>
		<lastmod>2018-05-24T14:20:05+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/klassifikation-mobiler-anwendungen-ueber-metadaten/</loc>
		<lastmod>2018-06-11T11:26:32+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/classification-of-mobile-applications-via-metadata/</loc>
		<lastmod>2018-06-11T11:29:13+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/access-control-of-finance-apis/</loc>
		<lastmod>2018-06-19T06:14:26+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/zugriffskontrolle-von-finanz-apis/</loc>
		<lastmod>2018-06-19T06:12:45+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/verteilter-datenspeicher-in-heterogenen-umgebungen/</loc>
		<lastmod>2018-07-12T14:11:24+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/distributed-storage-in-heterogeneous-environments/</loc>
		<lastmod>2018-07-12T14:12:04+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/redactable-blockchain/</loc>
		<lastmod>2018-10-01T07:20:47+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/redactable-blockchain-2/</loc>
		<lastmod>2018-10-01T07:43:46+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/decentralised-data-storage/</loc>
		<lastmod>2020-03-29T17:29:45+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/dezentrale-datenspeicherung/</loc>
		<lastmod>2020-03-29T17:29:22+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/similarity-of-source-code-in-applications/</loc>
		<lastmod>2018-11-04T21:42:08+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/aehnlichkeit-von-quellcode-in-anwendungen/</loc>
		<lastmod>2018-11-04T21:42:24+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/moa-zs/</loc>
		<lastmod>2021-01-25T12:26:20+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/moa-zs-2/</loc>
		<lastmod>2025-09-25T14:07:13+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/katastrophenkommunikation_mit_mesh_software/</loc>
		<lastmod>2018-11-12T15:14:11+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/disaster-communication-using-mesh-software/</loc>
		<lastmod>2018-11-12T19:51:06+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/eidas-node-monitor/</loc>
		<lastmod>2018-11-12T21:59:36+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/eidas-node-monitor-2/</loc>
		<lastmod>2018-11-12T21:57:27+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/sichere-push-benachrichtigungen/</loc>
		<lastmod>2018-12-29T10:58:12+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/secure-push-notifications/</loc>
		<lastmod>2018-12-29T10:07:25+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/sicherheitsvergleich-von-apps-auf-android-und-ios/</loc>
		<lastmod>2018-12-29T11:39:24+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/security-comparison-of-apps-on-android-and-ios/</loc>
		<lastmod>2018-12-29T11:40:35+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/distributed-event-system/</loc>
		<lastmod>2019-01-29T12:03:10+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/verteiltes-eventsystem/</loc>
		<lastmod>2019-01-07T10:41:51+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/pdf-as-de/</loc>
		<lastmod>2021-11-10T09:33:59+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/voting-systems-for-public-blockchains/</loc>
		<lastmod>2019-02-06T12:55:24+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/abstimmungen-in-der-oeffentlichen-blockchain/</loc>
		<lastmod>2019-02-06T12:54:27+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/evaluation-of-safety-standards-for-iot-household-appliances/</loc>
		<lastmod>2019-03-01T13:49:56+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/beurteilung-von-sicherheitsstandards-fuer-iot-haushaltsgeraete/</loc>
		<lastmod>2019-03-01T13:50:25+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/moegliche-seitenkanaele-durch-deduplikation/</loc>
		<lastmod>2019-05-15T13:51:04+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/possible-side-channels-through-deduplication/</loc>
		<lastmod>2019-05-15T13:51:37+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/security-of-blockchain-based-cryptocurrencies/</loc>
		<lastmod>2019-07-02T11:24:41+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/sicherheit-von-blockchain-basierten-kryptowaehrungen/</loc>
		<lastmod>2019-07-02T11:25:02+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/sicherheitsanalyse-aktueller-peer-to-peer-netze/</loc>
		<lastmod>2019-05-22T07:48:09+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/security-analysis-of-current-peer-to-peer-networks/</loc>
		<lastmod>2019-05-22T07:47:24+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/threat-modeling-basierend-auf-hardware/</loc>
		<lastmod>2019-05-23T18:17:40+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/threat-modeling-based-on-hardware/</loc>
		<lastmod>2019-05-23T18:22:17+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/detecting-certificate-misissue-via-ct-logs/</loc>
		<lastmod>2020-03-29T17:37:28+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/erkennung-zertifikatsmissbrauch-ueber-ctl/</loc>
		<lastmod>2020-03-29T17:37:02+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/remote-attestation-state-of-the-art/</loc>
		<lastmod>2020-03-29T17:36:40+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/topologische-analyse-von-programmcode/</loc>
		<lastmod>2019-07-02T11:34:12+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/topological-analysis-of-program-code/</loc>
		<lastmod>2019-07-02T11:34:25+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/erhebung-state-of-the-art-remote-attestation/</loc>
		<lastmod>2020-03-29T17:36:10+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/massnahmen-mobiler-betriebssysteme-gegen-malware/</loc>
		<lastmod>2019-06-18T10:14:04+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/protection-concepts-of-mobile-operating-systems-against-malware/</loc>
		<lastmod>2019-06-18T10:16:00+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/erkennung-von-code-injection-schwachstellen-in-html5-apps/</loc>
		<lastmod>2019-08-21T09:38:36+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/detection-of-code-injection-vulnerabilities-in-html5-apps/</loc>
		<lastmod>2019-08-21T09:38:28+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/semantische-korrelation-von-eigenschaften-in-android/</loc>
		<lastmod>2019-10-14T06:12:53+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/semantic-correlation-of-properties-in-android/</loc>
		<lastmod>2019-10-14T06:13:37+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/browser-erkennungsmethoden/</loc>
		<lastmod>2024-08-08T12:07:42+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/browser-detection-methods/</loc>
		<lastmod>2019-11-06T14:01:20+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/policy-enforcement-in-distributed-environments/</loc>
		<lastmod>2021-05-06T07:13:46+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/policy-enforcement-in-verteilten-umgebungen/</loc>
		<lastmod>2021-05-06T07:13:49+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/isolation-von-unterschieden-in-mobilanwendungen/</loc>
		<lastmod>2019-12-14T16:37:30+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/isolation-of-differences-in-mobile-applications/</loc>
		<lastmod>2019-12-14T16:38:32+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/implementation-of-an-editable-proof-of-work-based-blockchain/</loc>
		<lastmod>2019-12-30T16:49:42+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/implementierung-einer-proof-of-work-basierten-editierbaren-blockchain/</loc>
		<lastmod>2019-12-30T16:50:01+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/technical-analysis-of-the-general-transparency-paradigm/</loc>
		<lastmod>2020-03-29T17:26:35+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/technische-analyse-transparenz-paradigma/</loc>
		<lastmod>2020-03-29T17:25:59+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/analyse-des-utxo-sets-von-bitcoin/</loc>
		<lastmod>2020-03-26T17:01:42+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/analysis-of-the-bitcoin-utxo-set/</loc>
		<lastmod>2020-03-26T17:13:42+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/systematic-analysis-of-the-fingerprintability-of-android/</loc>
		<lastmod>2020-10-30T12:21:11+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/systematische-analyse-von-android-auf-fingerprintbarkeit/</loc>
		<lastmod>2020-10-30T12:23:31+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/gap-analysis-of-data-transparency-logging-architectures/</loc>
		<lastmod>2020-08-11T19:55:12+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/analyse-von-transparency-logging-fur-daten-transparenz/</loc>
		<lastmod>2020-08-11T19:54:52+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/aehnlichkeit-von-android-anwendungen-ueber-deep-learning/</loc>
		<lastmod>2020-04-27T09:09:13+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/similarity-of-android-applications-via-deep-learning/</loc>
		<lastmod>2020-04-27T09:10:51+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/e-id-neu/</loc>
		<lastmod>2020-12-23T21:16:23+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/new-e-id/</loc>
		<lastmod>2020-12-23T21:14:37+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/ios-interface-for-network-traffic-logging/</loc>
		<lastmod>2020-08-29T11:03:30+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/ios-schnittstelle-zur-netzwerkanalyse/</loc>
		<lastmod>2020-08-29T11:02:44+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/measurements-of-timing-differences-in-the-android-api/</loc>
		<lastmod>2020-06-15T11:27:59+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/messung-timing-unterschiede-in-der-android-api/</loc>
		<lastmod>2020-06-15T11:24:11+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/analyse-des-electroneum-cloud-miners/</loc>
		<lastmod>2020-08-10T06:40:19+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/analysis-of-electroneum-cloud-mining/</loc>
		<lastmod>2020-08-10T06:40:03+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/privacy-preserving-service-compositon/</loc>
		<lastmod>2020-09-29T12:38:01+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/privacy-preserving-service-composition/</loc>
		<lastmod>2020-09-29T12:36:48+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/mocca/</loc>
		<lastmod>2022-12-20T13:12:40+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/ssi-offline-verifiable-attributes/</loc>
		<lastmod>2020-10-10T20:39:22+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/ssi-offline-verifiable-attributes-2/</loc>
		<lastmod>2020-10-10T20:39:54+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/semantic-search-of-related-patterns-in-source-code/</loc>
		<lastmod>2020-09-13T17:32:51+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/semantische-suche-verwandter-muster-in-quellcode/</loc>
		<lastmod>2020-09-13T17:33:07+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/datenschutz-ueber-verifiable-data-audits/</loc>
		<lastmod>2023-07-27T09:03:44+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/privacy-preserving-verifiable-data-audits/</loc>
		<lastmod>2020-11-11T10:12:03+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/providing-smartphone-features-on-the-desktop/</loc>
		<lastmod>2020-10-13T07:52:02+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/bereitstellung-von-smartphone-features-am-desktop/</loc>
		<lastmod>2020-10-13T07:52:45+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/iot-geraete-in-service-kompositionen/</loc>
		<lastmod>2020-10-27T08:31:31+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/iot-devices-in-service-compositions/</loc>
		<lastmod>2020-10-27T08:30:02+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/sicherheitsanalyse-von-ipfs/</loc>
		<lastmod>2020-10-30T13:54:55+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/ipfs-security-analysis/</loc>
		<lastmod>2020-10-30T13:54:26+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/modellierung-fingerprintbarer-informationsquellen/</loc>
		<lastmod>2020-12-07T13:28:47+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/modeling-of-fingerprintable-information-sources/</loc>
		<lastmod>2020-12-07T13:29:57+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/digital-id-cards/</loc>
		<lastmod>2021-03-17T07:02:01+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/compressible-blockchain/</loc>
		<lastmod>2021-03-15T19:32:53+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/komprimierbare-blockchain/</loc>
		<lastmod>2021-03-15T19:32:39+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/elektronische-nachweise/</loc>
		<lastmod>2021-03-17T07:03:25+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/pdf-as/</loc>
		<lastmod>2021-11-10T09:33:23+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/moa-spss/</loc>
		<lastmod>2021-01-26T14:25:13+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/correctness-completeness-and-non-repudiation-of-transparency-logs/</loc>
		<lastmod>2021-03-15T19:23:26+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/verbindlichkeit-von-transparenzlogs/</loc>
		<lastmod>2021-04-26T17:47:34+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/einsatz-von-nfc-in-eids-in-ausgewaehlten-eu-laendern/</loc>
		<lastmod>2021-01-07T12:48:59+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/use-of-nfc-in-eids-in-selected-eu-countries/</loc>
		<lastmod>2021-01-07T12:48:44+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/moa-sp-ss/</loc>
		<lastmod>2021-01-26T14:24:58+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/ssi-strong-authentication/</loc>
		<lastmod>2021-04-26T17:43:54+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/ssi-strong-authentication-2/</loc>
		<lastmod>2021-04-26T17:42:58+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/studie-und-analyse-von-eigenschaften-elektronischer-nachweise/</loc>
		<lastmod>2021-04-26T18:55:55+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/digital-id-cards-study-and-analysis-of-properties/</loc>
		<lastmod>2021-03-17T07:08:13+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/sicherheitsanalyse-mobiler-anwendungen-fuer-krypto-waehrungen/</loc>
		<lastmod>2021-04-26T17:46:08+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/security-analysis-of-mobile-applications-for-crypto-currencies/</loc>
		<lastmod>2021-04-26T17:48:31+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/neue-vertrauensmodelle-durch-trusted-computing/</loc>
		<lastmod>2021-04-06T08:52:46+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/new-trust-models-based-on-trusted-computing/</loc>
		<lastmod>2021-04-06T09:03:44+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/influence-of-vendor-customisations-on-device-security/</loc>
		<lastmod>2021-04-16T13:27:56+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/einfluss-von-herstelleranpassungen-auf-die-geraetesicherheit/</loc>
		<lastmod>2021-04-16T13:29:25+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/incremental-bitcoin-snapshots/</loc>
		<lastmod>2021-04-19T10:55:18+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/inkrementelle-bitcoin-snapshots/</loc>
		<lastmod>2021-04-19T10:55:31+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/sicherheitskonzept-fuer-digital-twins/</loc>
		<lastmod>2021-05-25T08:52:57+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/security-architecture-for-ditital-twins/</loc>
		<lastmod>2021-05-25T14:28:25+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/anonymous-service-consumption-for-service-composition-systems/</loc>
		<lastmod>2021-06-01T11:31:16+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/anonyme-nutzung-von-services-in-service-kompositionssystemen/</loc>
		<lastmod>2021-06-01T09:53:38+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/android-application-patching-through-runtime-manipulation/</loc>
		<lastmod>2021-07-05T09:47:30+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/android-application-patching-durch-runtime-manipulation/</loc>
		<lastmod>2021-07-05T09:45:39+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/enhancing-the-internet-of-things-iot-by-utilizing-self-sovereign-identity-ssi/</loc>
		<lastmod>2021-07-16T13:54:44+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/enhancing-the-internet-of-things-iot-by-utilizing-self-sovereign-identity-ssi-2/</loc>
		<lastmod>2021-07-16T14:14:15+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/fundamental-challenges-with-public-blockchains/</loc>
		<lastmod>2021-07-20T12:31:04+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/grundlegende-herausforderungen-in-oeffentlichen-blockchains/</loc>
		<lastmod>2021-07-20T12:31:30+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/resource-efficient-dtls-handshakes-for-iot-sensors/</loc>
		<lastmod>2021-07-21T08:54:58+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/ressourcen-schonende-dtls-handshakes-fuer-iot-sensoren/</loc>
		<lastmod>2021-07-21T08:58:22+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/dezentrale-verfahren-fuer-gleichzeitige-bearbeitung-gemeinsamer-datenstrukturen/</loc>
		<lastmod>2021-07-23T15:17:49+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/decentral-methods-for-simultaneous-editing-of-shared-data-structures/</loc>
		<lastmod>2021-07-23T15:17:28+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/verhaltensbasierte-authentifizierung-in-digitales-amt-app/</loc>
		<lastmod>2021-07-26T15:24:31+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/behavioral-authentication-in-digitales-amt-app/</loc>
		<lastmod>2021-07-26T15:23:52+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/automatische-erkennung-und-behebung-von-crypto-api-misuse-in-android-applikationen/</loc>
		<lastmod>2021-08-20T14:00:30+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/automatic-detection-and-mitigation-of-crypto-api-misuse-in-android-applications/</loc>
		<lastmod>2021-08-20T14:09:35+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/herausforderungen-durch-verschluesselung-wiederherstellung-und-verarbeitung/</loc>
		<lastmod>2021-10-04T08:37:50+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/challenges-of-encyption-recovery-and-computation/</loc>
		<lastmod>2021-10-04T08:38:35+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/whitepaper-apis-in-der-oeffentlichen-verwaltung/</loc>
		<lastmod>2021-10-18T10:11:04+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/whitepaper-apis-in-e-government/</loc>
		<lastmod>2021-10-18T10:10:13+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/cross-user-sicherheit-unter-android/</loc>
		<lastmod>2021-10-25T15:39:08+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/cross-user-security-on-android/</loc>
		<lastmod>2021-10-25T15:48:04+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/on-device-patching-framework-fuer-android-anwendungen/</loc>
		<lastmod>2021-12-21T09:47:28+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/on-device-patching-framework-for-android-applications/</loc>
		<lastmod>2021-12-21T09:49:48+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/secure-edge-computing-technologies/</loc>
		<lastmod>2022-07-28T12:16:20+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/sichere-edge-computing-technologien/</loc>
		<lastmod>2022-07-28T12:12:53+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/pdf-over-2/</loc>
		<lastmod>2025-09-25T14:12:46+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/cryptographic-access-protection-transformation-from-interactive-to-non-interactive-proxy-re-encryption/</loc>
		<lastmod>2022-03-28T14:34:30+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/kryptographischer-zugriffsschutz-transformation-von-interaktiver-zu-nicht-interaktiver-proxy-re-encryption/</loc>
		<lastmod>2022-03-28T14:37:34+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/areas-of-application-for-artificial-intelligence-in-austrian-e-government/</loc>
		<lastmod>2022-06-06T16:10:26+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/anwendungsgebiete-fuer-kuenstliche-intelligenz-im-oesterreichischen-e-government/</loc>
		<lastmod>2022-06-06T16:07:30+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/conclusions-from-ssi-applied-in-a-trust-policy-language/</loc>
		<lastmod>2022-07-28T12:15:56+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/ueber-die-integration-von-self-sovereign-identity-in-eine-policy-sprache/</loc>
		<lastmod>2023-01-17T14:26:46+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/privatheitsbewahrende-trust-policies/</loc>
		<lastmod>2023-01-17T14:26:38+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/security-and-privacy-aspects-of-ai-based-e-government-services/</loc>
		<lastmod>2023-01-17T14:26:12+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/sicherheits-und-privatsphaere-aspekte-von-ki-basierten-e-government-diensten/</loc>
		<lastmod>2023-01-17T14:26:07+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/erstellung-eines-ios-automationsframeworks-zur-sicherheitsanalyse/</loc>
		<lastmod>2023-01-17T14:26:00+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/creation-of-an-ios-automation-framework-for-security-analysis/</loc>
		<lastmod>2023-01-17T14:25:56+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/analyse-der-sicherheit-und-performance-von-scoped-storage-unter-android/</loc>
		<lastmod>2023-01-17T14:25:52+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/security-and-performance-analysis-of-scoped-storage-on-android/</loc>
		<lastmod>2023-01-17T14:25:47+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/kuenstliche-intelligenz-und-it-sicherheit/</loc>
		<lastmod>2022-10-21T11:40:17+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/artificial-intelligence-and-it-security/</loc>
		<lastmod>2023-01-17T14:25:41+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/a-survey-on-enhancing-privacy-awareness-on-android/</loc>
		<lastmod>2023-01-17T14:25:36+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/a-survey-on-enhancing-privacy-awareness-on-android-2/</loc>
		<lastmod>2023-01-17T14:25:31+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/analysis-of-the-fingerprintability-of-ios-devices/</loc>
		<lastmod>2023-01-17T14:24:24+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/untersuchung-der-fingerprintbarkeit-von-ios-geraeten/</loc>
		<lastmod>2023-01-17T14:24:12+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/offlineverfuegbarkeit-von-smart-contract-basierten-registern/</loc>
		<lastmod>2023-01-17T14:21:02+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/verwendung-eines-android-smartphones-als-schluesselspeicher-fuer-web-authentication/</loc>
		<lastmod>2023-02-07T14:37:03+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/utilising-an-android-smartphone-as-a-key-store-for-web-authentication/</loc>
		<lastmod>2023-02-07T14:37:27+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/praevalenz-von-http-in-aktuellen-android-anwendungen/</loc>
		<lastmod>2023-01-26T09:24:25+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/prevalence-of-http-in-android-applications/</loc>
		<lastmod>2023-01-26T09:35:07+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/laufzeit-integritaetspruefung-in-android-applikationen/</loc>
		<lastmod>2023-02-13T14:39:38+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/runtime-integrity-checkin-in-android-applications/</loc>
		<lastmod>2023-02-13T14:39:20+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/detecting-inconsistencies-between-android-app-descriptions-and-permissions/</loc>
		<lastmod>2023-02-15T09:41:29+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/erkennen-von-inkonsistenzen-zwischen-android-app-beschreibungen-und-berechtigungen-2/</loc>
		<lastmod>2023-02-15T09:45:35+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/sichere-entwicklung-von-ki-diensten/</loc>
		<lastmod>2023-07-27T09:02:52+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/secure-development-of-ai-services/</loc>
		<lastmod>2023-02-22T16:10:19+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/moeglichkeiten-zur-umsetzung-eines-oesterreichischen-e-government-dienstes-mittels-offener-daten/</loc>
		<lastmod>2023-07-27T09:02:38+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/possibilities-for-implementing-an-austrian-e-government-service-using-open-data/</loc>
		<lastmod>2023-02-22T16:17:44+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/privacy-enhancements-for-flexible-access-control-policies/</loc>
		<lastmod>2023-05-22T18:15:04+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/verbesserte-privatsphaere-fuer-flexible-zugangskontrollsysteme/</loc>
		<lastmod>2023-05-22T18:14:47+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/datenschutzvergleich-zwischen-kostenpflichtigen-und-kostenlosen-apps/</loc>
		<lastmod>2023-05-04T21:16:20+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/vergleich-der-fingerprintbarkeit-von-android-und-ios/</loc>
		<lastmod>2023-05-11T12:58:35+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/comparison-of-the-fingerprintability-of-android-and-ios/</loc>
		<lastmod>2023-05-11T12:58:16+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/datenschutzvergleich-zwischen-kostenpflichtigen-und-kostenlosen-apps-2/</loc>
		<lastmod>2023-04-29T11:36:43+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/theoretical-analysis-of-the-approach-to-the-development-of-ai-based-services/</loc>
		<lastmod>2023-04-29T11:41:57+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/privacy-comparison-between-paid-and-free-apps/</loc>
		<lastmod>2023-05-04T21:20:46+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/analyse-von-android-code-transparency/</loc>
		<lastmod>2023-05-09T10:54:45+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/analysis-of-android-code-transparency/</loc>
		<lastmod>2023-05-09T11:03:02+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/untersuchung-der-content-provider-schnittstelle-unter-android/</loc>
		<lastmod>2023-07-25T15:39:31+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/investigation-of-the-content-provider-interface-on-android/</loc>
		<lastmod>2023-07-25T15:39:55+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/access-control-for-distributed-data-analysis-using-secure-multi-party-computation/</loc>
		<lastmod>2023-09-11T11:48:08+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/zugriffskontrolle-fuer-verteilte-datenanalyse-mittels-secure-multi-party-computation/</loc>
		<lastmod>2023-09-11T11:49:06+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/state-of-the-art-black-box-ui-testing-von-android-anwendungen/</loc>
		<lastmod>2023-09-26T10:36:50+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/state-of-the-art-black-box-ui-testing-of-android-applications/</loc>
		<lastmod>2023-09-26T10:44:57+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/erkennung-von-emulatoren-in-der-malware-analyse-unter-android/</loc>
		<lastmod>2023-10-23T11:02:43+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/detection-of-emulators-in-malware-analysis-on-android/</loc>
		<lastmod>2023-10-23T11:04:29+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/reduzierung-der-fingerprintbarkeit-von-android-smartphones/</loc>
		<lastmod>2023-12-29T16:02:54+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/reducing-the-fingerprintability-of-android-smartphones/</loc>
		<lastmod>2023-12-29T16:02:26+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/identity-recovery-in-case-of-device-loss/</loc>
		<lastmod>2024-01-22T14:56:28+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/wiederherstellung-von-identitaeten-bei-geraeteverlus/</loc>
		<lastmod>2024-01-22T14:55:05+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/analyse-der-android-health-connect-schnittstelle/</loc>
		<lastmod>2024-01-18T10:34:17+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/analysis-of-the-android-health-connect-programming-interface/</loc>
		<lastmod>2024-01-18T10:35:56+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/evaluierung-des-secure-aggregation-aspekts-in-privatsphaeren-bewahrendem-federated-machine-learning/</loc>
		<lastmod>2024-01-22T10:26:05+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/aktuelle-juice-jacking-angriffe-und-gegenmassnahmen-fuer-mobilgeraete/</loc>
		<lastmod>2024-02-13T14:01:00+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/state-of-the-art-juice-jacking-attacks-and-countermeasures-for-mobile-devices/</loc>
		<lastmod>2024-02-13T14:08:35+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/evaluierung-von-mpcs-stand-der-technik/</loc>
		<lastmod>2024-03-05T16:12:52+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/evaluation-of-mpcs-state-of-the-art/</loc>
		<lastmod>2024-03-09T12:43:36+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/einfluss-von-aenderungen-an-der-laufzeitumgebung-auf-android-applikationen/</loc>
		<lastmod>2024-04-02T10:50:14+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/influence-of-changes-to-the-runtime-environment-on-android-applications/</loc>
		<lastmod>2024-04-02T10:49:52+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/service-provider-accreditation-with-attribute-constraints/</loc>
		<lastmod>2024-04-29T16:51:42+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/service-provider-akkreditierung-mit-attributbeschraenkungen/</loc>
		<lastmod>2024-08-27T16:28:30+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/potentielle-covert-channels-durch-kernel-samepage-merging-unter-android/</loc>
		<lastmod>2024-05-17T11:29:02+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/potential-covert-channel-through-kernel-samepage-merging-on-android/</loc>
		<lastmod>2024-05-17T11:32:57+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/the-role-of-verifiable-data-registries-in-the-verifiable-credential-ecosystem/</loc>
		<lastmod>2024-06-03T07:30:06+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/die-rolle-von-vertrauensregistern-im-oekosystem-fuer-verifizierbare-anmeldeinformationen/</loc>
		<lastmod>2024-06-03T07:40:44+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/evaluation-von-secure-multi-party-computation-frameworks-im-web-browser/</loc>
		<lastmod>2024-06-14T13:25:12+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/evaluation-of-secure-multi-party-computation-frameworks-for-the-web-browser/</loc>
		<lastmod>2024-06-14T13:31:16+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/analyse-der-android-privacy-sandbox/</loc>
		<lastmod>2024-08-08T12:05:22+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/analysis-of-the-android-privacy-sandbox/</loc>
		<lastmod>2024-08-08T12:04:32+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/sicherheitsanalyse-der-neuen-sideloading-moeglichkeiten-von-ios-17-4-ipados-18/</loc>
		<lastmod>2024-07-23T08:27:17+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/security-analysis-of-new-sideloading-possibilities-on-ios-17-4-ipados-18/</loc>
		<lastmod>2024-07-23T08:31:00+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/untersuchung-des-berechtigungssystems-unter-android/</loc>
		<lastmod>2024-12-14T19:20:33+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/investigation-of-the-permission-system-of-android/</loc>
		<lastmod>2024-12-14T19:32:01+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/privacy-preserving-identifiers/</loc>
		<lastmod>2024-09-19T15:04:04+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/privatsphaere-bewahrende-identifikatoren/</loc>
		<lastmod>2024-09-19T15:04:40+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/mpc-basierte-sichere-aggregation-in-federated-learning-ueberblick-protokolle-googles-gboard/</loc>
		<lastmod>2024-09-26T08:34:03+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/mpc-based-secure-aggregation-in-federated-learning-overview-protocols-googles-gboard/</loc>
		<lastmod>2024-09-26T09:00:06+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/analyse-von-fingerprinting-bibliotheken-auf-android/</loc>
		<lastmod>2024-12-14T19:27:48+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/analysis-of-fingerprinting-libraries-on-android/</loc>
		<lastmod>2024-12-14T19:30:51+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/designueberlegungen-von-ex-post-tets-fuer-die-transparenz-von-anmeldeinformationen/</loc>
		<lastmod>2024-11-21T04:03:04+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/design-considerations-of-ex-post-tets-for-credential-transparency/</loc>
		<lastmod>2024-11-21T04:04:45+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/federated-credential-management-fedcm-api/</loc>
		<lastmod>2025-01-17T14:28:11+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/federated-credential-management-fedcm-api-2/</loc>
		<lastmod>2025-01-17T14:29:26+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/authentizitaet-korrektheitsgarantien-in-federated-learning-ueberblick-methoden/</loc>
		<lastmod>2025-01-22T10:36:35+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/authenticity-verifiability-in-federated-learning-overview-methods/</loc>
		<lastmod>2025-01-22T10:56:16+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/sicherheitsanalyse-von-nativer-kryptografie-in-android-apps/</loc>
		<lastmod>2025-02-10T13:34:40+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/security-analysis-of-native-cryptography-in-android-apps/</loc>
		<lastmod>2025-02-10T13:35:01+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/schutz-vor-split-view-angriffen-fuer-transparenzsysteme/</loc>
		<lastmod>2025-02-27T08:15:48+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/split-view-attack-protection-for-transparency-systems/</loc>
		<lastmod>2025-02-27T07:35:11+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/eidas-eingebettete-offenlegungsregelungen/</loc>
		<lastmod>2025-07-04T15:48:41+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/eidas-embedded-disclosure-policies/</loc>
		<lastmod>2025-07-04T15:47:34+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/implementation-and-evaluation-of-the-digital-credentials-api/</loc>
		<lastmod>2025-06-16T12:10:58+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/implementierung-und-evaluierung-der-digital-credentials-api/</loc>
		<lastmod>2025-06-16T12:11:11+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/wallet-binary-transparency/</loc>
		<lastmod>2025-06-24T11:16:17+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/wallet-binary-transparency-2/</loc>
		<lastmod>2025-06-24T11:15:41+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/analyse-zu-einsatzmoeglichkeiten-von-ki-im-code-refactoring/</loc>
		<lastmod>2025-08-18T12:17:27+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/analysis-of-possible-applications-of-ai-in-code-refactoring/</loc>
		<lastmod>2025-08-18T12:19:35+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/certificate-transparency-fuer-die-relying-party-zertifikate/</loc>
		<lastmod>2025-08-27T12:33:24+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/certificate-transparency-for-relying-party-certificates/</loc>
		<lastmod>2025-08-27T13:32:57+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/faqs/</loc>
		<lastmod>2025-09-08T13:00:09+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/pdf-over-faqs/</loc>
		<lastmod>2025-09-08T13:09:15+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://technology.a-sit.at/en/pdf-over-3/</loc>
		<lastmod>2025-09-26T05:29:23+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
</urlset><!-- Request ID: d41774f89a279fa7b42ed5c4c594c2f2; Queries for sitemap: 587; Total queries: 634; Seconds: 0.56; Memory for sitemap: 2MB; Total memory: 60MB -->
