Biometric authentication has become one of the most widely used authentication methods, especially on smartphones and in the Digitales-Amt app. […]
Category: IT Security
Decentral Methods for Simultaneous Editing of Shared Data Structures
Systems such as Google Docs or web-based versions of Microsoft Office have been instrumental in driving collaborative document editing. Distributed […]
Resource efficient DTLS Handshakes for IoT Sensors
Every year, more and more smart sensors measure and influence many parts of our daily lives. Such sensors usually work […]
Fundamental challenges with public blockchains
In this study, we present selected properties of public blockchains on the example of Bitcoin. Depending on the use case, […]
Enhancing the Internet-of-Things (IoT) by utilizing Self-Sovereign-Identity (SSI)
Self-Sovereign Identity (SSI) represents a recent identity model that enhances the user-centric identity model. SSI utilizes distributed ledger technoloy to […]
Android Application Patching Through Runtime Manipulation
Application patching is a promising concept for modifying the execution flow of a compiled Android application for the purpose of […]
Anonymous Service Consumption for Service Composition Systems
Service compositions are implemented through the interplay between actors of different organizations. To protect the privacy of a service consumer’s […]
Security Architecture for Digital Twins
The concept of digital twins has gained traction over recent years. A digital twin is a digital representation of a […]
Incremental Bitcoin Snapshots
This project presents an architecture for a compressible blockchain, which supplements the primary blockchain with a second linked blockchain. This […]
Influence of Vendor Customisations on Device Security
In order to differentiate devices from other manufacturers and offer users added value, manufacturers of Android smartphones customize their devices. […]