In order to gain a better understanding of what influences the security of mobile applications under Android and iOS, typical […]
Category: IT Security
Disaster Communication using Mesh Software
This project demonstrates the creation of a mesh network consisting of stationary and mobile nodes, based on cost-efficient hardware and […]
Similarity of Source Code in Applications
In order to gain a more abstract understanding of the behavior of program code, this project uses current scientific approaches […]
Decentralised Data Storage
Decentralised data storage is a complex topic, especially with regard to authenticity and integrity of data. On the one hand, […]
Redactable Blockchain
This project report starts by giving an overview of various data insertion methods available in Bitcoin. After this introduction, the report […]
Distributed Storage in Heterogeneous Environments
Cross-device, distributed storage is primarily established as a cloud-based service. Common alternatives to these often server-centric architectures typically allow either […]
Access Control of Finance APIs
The PSD2 Directive has redefined the framework for interfaces for payment service providers. In a study, we examine technical and […]
Overview of Modern Cryptocurrencies
This study gives an overview of cryptocurrencies that are optimized for privacy or scalability. In detail, this study covers the […]
IoT-isolation via mini-router
This project shows the possibility to segregate IoT devices from the rest of the home network via an additional router. […]
Secure Peer-to-Peer Networking Based on Self-Certification
Peer-to-peer networks enable separation of identity (identifier) and location (network address). This separation makes it possible to implement virtual, homogeneous […]