Skip to content Skip to Navigation
A-SIT Technologie

Main Navigation

  • About A-SIT
  • License Agreement
  • Sitemap
  • Deutsch
  • English
  • eID & eSignature
  • eGovernment
  • Mobile & Cloud
  • IT Security
  • Software
    • Open Source Modules
    • Services
    • Tools
  • Archive
Home IT Security (: Seite 10)

Category: IT Security

Threat Modeling based on hardware

posted in #IT Security on the 23.05.2019

Threat modeling is well established in the software engineering field to show potential IT vulnerabilities of an artefact and to […]

Security Analysis of Current Peer-to-Peer Networks

posted in #IT Security, Mobile & Cloud on the 22.05.2019

This project analyses the security concepts of currently deployed peer-to-peer networks. The recent hype about cryptocurrencies has also been pushing […]

Security of Blockchain-Based Cryptocurrencies

posted in #IT Security on the 16.05.2019

In this project, we first describe different attacks on blockchain-based cryptocurrencies with a focus on Bitcoin. Examples are the 51% […]

Possible Side Channels through Deduplication

posted in #IT Security, Mobile & Cloud on the 15.05.2019

Modern file systems like ZFS offer extended functionality such as deduplication by supporting Copy on Write (CoW). Deduplication allows duplicated […]

Evaluation of safety standards for IoT household appliances

posted in #IT Security on the 1.03.2019

This work provides an overview of various safety standards applicable to IoT household appliances. We differentiate between compulsory standards, like […]

Voting Systems for Public Blockchains

posted in #IT Security on the 6.02.2019

In this project, we analyzed different blockchain based voting and signaling systems for public blockchains. These voting mechanisms are different […]

Distributed Event System

posted in #IT Security, Mobile & Cloud on the 7.01.2019

The use of distributed systems always requires a minimum amount of parallelism. More precisely, there is almost always a need […]

Security Comparison of Apps on Android and iOS

posted in #IT Security, Mobile & Cloud on the 25.12.2018

In order to gain a better understanding of what influences the security of mobile applications under Android and iOS, typical […]

Disaster Communication using Mesh Software

posted in #IT Security, Mobile & Cloud on the 12.11.2018

This project demonstrates the creation of a mesh network consisting of stationary and mobile nodes, based on cost-efficient hardware and […]

Similarity of Source Code in Applications

posted in #IT Security, Mobile & Cloud on the 4.11.2018

In order to gain a more abstract understanding of the behavior of program code, this project uses current scientific approaches […]

Posts navigation

Older posts
Newer posts
Categories
  • Archive
  • eGovernment
  • eID & eSignature
  • IT Security
    • Privacy-Preserving Computation
  • Mobile & Cloud
  • News
  • Software
    • Open Source Modules
    • Services
    • Tools
  • Home
  • About A-SIT
  • Imprint
  • Data Protection
  • Contact