An Architecture for Trustworthy Digital Supply Chain Transparency Services
☆18Oct 19, 2025Updated 4 months ago
Alternatives and similar repositories for draft-ietf-scitt-architecture
Users that are interested in draft-ietf-scitt-architecture are comparing it to the libraries listed below
Sorting:
- A specification including, problem statement, use cases, requirements, and architectural constituents for a Transparency Service in suppo…☆14Feb 17, 2023Updated 3 years ago
- SCITT API Emulator☆10Nov 22, 2024Updated last year
- Verifiable Credentials for Supply Chain Interoperability Specification for HTTP☆29Apr 5, 2025Updated 11 months ago
- Verifiable Credentials Working Group — VC JSON Web Tokens specification☆31Apr 28, 2025Updated 10 months ago
- GoTel - Scheduled job monitoring☆37Dec 9, 2022Updated 3 years ago
- ☆11Sep 23, 2025Updated 5 months ago
- This is a curated collection of articles and research papers related to the unexpected or unwanted outcomes , security & privacy ri…☆11Dec 17, 2025Updated 2 months ago
- This tool compares two Software Bill of Materials (SBOMs) and reports the differences.☆42Mar 2, 2026Updated last week
- A CVRF CSAF Converter, taking care about OASIS specification.☆10Jun 4, 2025Updated 9 months ago
- Supply Chain Integrity Transparency and Trust ledger application using Confidential Consortium Framework (CCF)☆40Mar 3, 2026Updated last week
- A caddy plugin to place Anubis (anti-AI scrapper) directly within caddy as a middleware.☆46Jan 14, 2026Updated last month
- An implementation of crypto.Signer and crypto.Decrypter for private keys resident on a TPM 2.0 device☆11Aug 6, 2025Updated 7 months ago
- ☆13Mar 2, 2026Updated last week
- Open Cryptanalysis Platform☆13Feb 7, 2026Updated last month
- Analyze experimental data with Programming by Navigation☆17Updated this week
- Minecraft Redstone Compiler☆14Feb 9, 2025Updated last year
- Exposing the UN/CEFACT vocabulary as web semantics☆13Sep 13, 2024Updated last year
- A more realistic demo of a buffer overflow cause by -ffast-math☆15Sep 10, 2022Updated 3 years ago
- Deepfakes weapon skins onto Valorant guns using CycleGAN☆10Jan 17, 2021Updated 5 years ago
- Sparkling training missions for web security☆12Apr 24, 2017Updated 8 years ago
- A Python implementation of the COSE specification (CBOR Object Signing and Encryption) described in RFC 8152.☆44Oct 9, 2025Updated 5 months ago
- Cross-platform Rust wrappers for the PCI ID Repository☆11Oct 3, 2025Updated 5 months ago
- A Rust doubly-linked intrusive list with Miri tests☆12May 4, 2024Updated last year
- A GeoDjango app to return Cascadia quake risk and resilience factors based on location☆12Updated this week
- retrobob is a retro gaming emulator that runs directly on your browser. Super Nintendo, NES/Famicom, Gameboy and Gameboy Color are curren…☆11Mar 25, 2024Updated last year
- Common MPC Pitfalls☆12Feb 14, 2026Updated 3 weeks ago
- work in progress, playing around with btor2 in rust☆12Feb 24, 2026Updated last week
- This bot attends the online classes held on Microsoft teams, according to the given timetable.Informs if bot is successfully joined the m…☆11Feb 2, 2022Updated 4 years ago
- ☆14Apr 14, 2025Updated 10 months ago
- ☆11Dec 11, 2024Updated last year
- Type-level interpolations in various forms☆12Dec 14, 2024Updated last year
- Kestrel Jupyter Notebook Kernel☆10Oct 19, 2023Updated 2 years ago
- ☆18Jun 6, 2025Updated 9 months ago
- ☆11Aug 17, 2023Updated 2 years ago
- Verifiable Credential Server for Web5.☆11Dec 17, 2022Updated 3 years ago
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructure☆14Oct 30, 2025Updated 4 months ago
- The Messenger of the Gods☆13Jan 15, 2026Updated last month
- Open-source deep research agent implemented with Letta☆24Aug 19, 2025Updated 6 months ago
- Malware Deobfuscation and RE Automation Tool Utilizing AI☆18Dec 29, 2025Updated 2 months ago