ietf-wg-scitt / draft-ietf-scitt-architectureView external linksLinks
An Architecture for Trustworthy Digital Supply Chain Transparency Services
☆17Oct 19, 2025Updated 3 months ago
Alternatives and similar repositories for draft-ietf-scitt-architecture
Users that are interested in draft-ietf-scitt-architecture are comparing it to the libraries listed below
Sorting:
- A specification including, problem statement, use cases, requirements, and architectural constituents for a Transparency Service in suppo…☆14Feb 17, 2023Updated 3 years ago
- SCITT API Emulator☆10Nov 22, 2024Updated last year
- Verifiable Credentials for Supply Chain Interoperability Specification for HTTP☆29Apr 5, 2025Updated 10 months ago
- GoTel - Scheduled job monitoring☆36Dec 9, 2022Updated 3 years ago
- Verifiable Credentials Working Group — VC JSON Web Tokens specification☆31Apr 28, 2025Updated 9 months ago
- A caddy plugin to place Anubis (anti-AI scrapper) directly within caddy as a middleware.☆44Jan 14, 2026Updated last month
- This tool compares two Software Bill of Materials (SBOMs) and reports the differences.☆41Oct 29, 2024Updated last year
- ☆11Sep 23, 2025Updated 4 months ago
- This is a curated collection of articles and research papers related to the unexpected or unwanted outcomes , security & privacy ri…☆11Dec 17, 2025Updated 2 months ago
- A CVRF CSAF Converter, taking care about OASIS specification.☆10Jun 4, 2025Updated 8 months ago
- Supply Chain Integrity Transparency and Trust ledger application using Confidential Consortium Framework (CCF)☆41Feb 9, 2026Updated last week
- ☆13Feb 11, 2026Updated last week
- Sparkling training missions for web security☆12Apr 24, 2017Updated 8 years ago
- Open Cryptanalysis Platform☆13Feb 7, 2026Updated last week
- Exposing the UN/CEFACT vocabulary as web semantics☆13Sep 13, 2024Updated last year
- Deepfakes weapon skins onto Valorant guns using CycleGAN☆10Jan 17, 2021Updated 5 years ago
- A more realistic demo of a buffer overflow cause by -ffast-math☆15Sep 10, 2022Updated 3 years ago
- Minecraft Redstone Compiler☆13Feb 9, 2025Updated last year
- An implementation of crypto.Signer and crypto.Decrypter for private keys resident on a TPM 2.0 device☆11Aug 6, 2025Updated 6 months ago
- A Python implementation of the COSE specification (CBOR Object Signing and Encryption) described in RFC 8152.☆43Oct 9, 2025Updated 4 months ago
- Malware Deobfuscation and RE Automation Tool Utilizing AI☆16Dec 29, 2025Updated last month
- A GeoDjango app to return Cascadia quake risk and resilience factors based on location☆12Updated this week
- GitHub Actions Security Tester☆12Feb 1, 2023Updated 3 years ago
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructure☆14Oct 30, 2025Updated 3 months ago
- Common MPC Pitfalls☆12Updated this week
- Convert text to speech using Google Translate API☆38Aug 1, 2017Updated 8 years ago
- The Messenger of the Gods☆13Jan 15, 2026Updated last month
- retrobob is a retro gaming emulator that runs directly on your browser. Super Nintendo, NES/Famicom, Gameboy and Gameboy Color are curren…☆11Mar 25, 2024Updated last year
- Learn the Design of a 6-stage pipelined RISC-V CPU☆17Oct 22, 2025Updated 3 months ago
- This bot attends the online classes held on Microsoft teams, according to the given timetable.Informs if bot is successfully joined the m…☆11Feb 2, 2022Updated 4 years ago
- work in progress, playing around with btor2 in rust☆12Updated this week
- ☆14Apr 14, 2025Updated 10 months ago
- Functions and proofs about game trees in Rocq, implemented as rose trees.☆12Dec 2, 2025Updated 2 months ago
- Kestrel Jupyter Notebook Kernel☆10Oct 19, 2023Updated 2 years ago
- Type-level interpolations in various forms☆12Dec 14, 2024Updated last year
- ☆11Dec 11, 2024Updated last year
- virt plugin for netdata to monitor libvirt-managed VMs☆11Mar 25, 2022Updated 3 years ago
- Verifiable Credential Server for Web5.☆11Dec 17, 2022Updated 3 years ago
- A Rust doubly-linked intrusive list with Miri tests☆12May 4, 2024Updated last year