Service compositions are implemented through the interplay between actors of different organizations. To protect the privacy of a service consumer’s […]
Category: IT Security
Security Architecture for Digital Twins
The concept of digital twins has gained traction over recent years. A digital twin is a digital representation of a […]
Incremental Bitcoin Snapshots
This project presents an architecture for a compressible blockchain, which supplements the primary blockchain with a second linked blockchain. This […]
Influence of Vendor Customisations on Device Security
In order to differentiate devices from other manufacturers and offer users added value, manufacturers of Android smartphones customize their devices. […]
New Trust Models based on Trusted Computing
Traditionally, two basic approaches to implementing trust models exist. On the one hand, there is hierarchical trust (most prominently standardised […]
Security Analysis of Mobile Applications for Crypto-Currencies
To manage virtual currencies such as Bitcoin or Ethereum, many users turn to mobile apps that promise a convenient form […]
Digital ID cards: Study and analysis of properties
Physical credentials are omnipresent in our everyday lives. Either in the form of a bank card, driving license, certificate, health […]
SSI Strong Authentication
Self-Sovereign Identity (SSI) is a new identity model, which aims to eliminate central trusted parties. Digital wallets are often used […]
Correctness, Completeness, and Non-Repudiation of Transparency Logs
Correctness and Completeness of are two desirable features for Transparency Logs. Unfortunately, when it comes to data processing events, these […]
Compressible Blockchain
In this project, we propose a compressible blockchain. The main idea is to use a second, linked chain that stores […]