This project shows the possibility to segregate IoT devices from the rest of the home network via an additional router. […]
Category: IT Security
Secure Peer-to-Peer Networking Based on Self-Certification
Peer-to-peer networks enable separation of identity (identifier) and location (network address). This separation makes it possible to implement virtual, homogeneous […]
Demonstrator IBE for Key Management
The project demonstrates an alternative approach of managing cryptographic keys in organisations (by using concepts of identity-based encryption). Key management […]
Merging Skytrust Tools
The project provides demonstrators to CrySIL (formerly “SkyTrust”). The Cryptographic Service Interoperability Layer (CrySIL), formerly known as Skytrust, complements applied cryptography […]
Android Browser – Security and Privacy
We investigated how advertisement blocking (ad blocking) can be implemented in Android browsers. Online advertising is growing rapidly. In 2007 […]
Device Enrolment Using Flexible Authentication
In order to provide solutions such as managed devices to end users, we compiled concepts for authenticating devices, with a focus […]
Traces on the Internet
A study deals with daily activities on the Internet, which leave traces, and shows how these can be used to […]
Blockchain & Smart Contracts
This report explains different types of Blockchains as well as different consensus algorithms. Blockchain is a distributed ledger that consists […]
Rich End-to-End Encryption
This project discusses the requirements of a solution to decouple the authentication process from an application that uses the Skytrust […]
Citizen Card Encrypted (CCE)
CCE enables container-based encryption of files and folders. Encryption of data can be performed using smart-cards (hardware based keys, currently various versions of Austrian […]