In this project, we analyzed different blockchain based voting and signaling systems for public blockchains. These voting mechanisms are different […]
Category: IT Security
Distributed Event System
The use of distributed systems always requires a minimum amount of parallelism. More precisely, there is almost always a need […]
Security Comparison of Apps on Android and iOS
In order to gain a better understanding of what influences the security of mobile applications under Android and iOS, typical […]
Disaster Communication using Mesh Software
This project demonstrates the creation of a mesh network consisting of stationary and mobile nodes, based on cost-efficient hardware and […]
Similarity of Source Code in Applications
In order to gain a more abstract understanding of the behavior of program code, this project uses current scientific approaches […]
Decentralised Data Storage
Decentralised data storage is a complex topic, especially with regard to authenticity and integrity of data. On the one hand, […]
Redactable Blockchain
This project report starts by giving an overview of various data insertion methods available in Bitcoin. After this introduction, the report […]
Distributed Storage in Heterogeneous Environments
Cross-device, distributed storage is primarily established as a cloud-based service. Common alternatives to these often server-centric architectures typically allow either […]
Access Control of Finance APIs
The PSD2 Directive has redefined the framework for interfaces for payment service providers. In a study, we examine technical and […]
Overview of Modern Cryptocurrencies
This study gives an overview of cryptocurrencies that are optimized for privacy or scalability. In detail, this study covers the […]