Skip to content Skip to Navigation
A-SIT Technologie

Main Navigation

  • About A-SIT
  • License Agreement
  • Sitemap
  • Deutsch
  • English
  • eID & eSignature
  • eGovernment
  • Mobile & Cloud
  • IT Security
  • Software
    • Open Source Modules
    • Services
    • Tools
  • Archive
Home IT Security (: Seite 8)

Category: IT Security

Analysis of Electroneum Cloud Mining

posted in #IT Security, Mobile & Cloud on the 27.07.2020

Electroneum is one of the first cryptocurrencies that allows users to mine coins with a mobile device. Electroneum’s Cloud Mining […]

iOS Interface for Network Traffic Logging

posted in #IT Security, Mobile & Cloud on the 15.06.2020

This project investigates three methods to record and analyze network traffic on an iOS device. In the first approach, methods […]

Similarity of Android Applications via Deep Learning

posted in #IT Security, Mobile & Cloud on the 27.04.2020

In view of the unbroken popularity of applications for the Android mobile platform, there are numerous apps in the “App […]

Gap Analysis of Data Transparency Logging Architectures

posted in #eGovernment, IT Security on the 22.04.2020

The General Data Protection Regulation (GDPR) specifies a series of transparency obligations for data controllers concerning the processing and sharing […]

Systematic Analysis of the Fingerprintability of Android

posted in #IT Security, Mobile & Cloud on the 6.04.2020

This report presents a framework that can automatically recognize fingerprintable information sources on Android devices. For this purpose it automatically […]

Analysis of the Bitcoin UTXO Set

posted in #IT Security, Mobile & Cloud on the 26.03.2020

This project describes and analyzes the set of unspent transaction outputs (UTXO set) in Bitcoin. The UTXO set contains all […]

Technical Analysis of the General Transparency Paradigm

posted in #IT Security on the 25.03.2020

This project analyzed alternative ways to enable transparency for stakeholders in a trust service-based ecosystem, besides traditional third-party certification. One […]

Implementation of an editable proof-of-work based blockchain

posted in #IT Security on the 30.12.2019

In this project, we developed a demonstrator for an editable proof-of-work based blockchain in Java and Kotlin. The blockchain end […]

Isolation of Differences in Mobile Applications

posted in #IT Security, Mobile & Cloud on the 14.12.2019

Applications for mobile platforms, such as Android and iOS, are frequently updated and pushed to devices via the respective distribution […]

Policy Enforcement in Distributed Environments

posted in #IT Security, Mobile & Cloud on the 18.11.2019

In scenarios in which several participants with different properties operate on a common database, the need for (automated) policy enforcement […]

Posts navigation

Older posts
Newer posts
Categories
  • Archive
  • eGovernment
  • eID & eSignature
  • IT Security
    • Privacy-Preserving Computation
  • Mobile & Cloud
  • News
  • Software
    • Open Source Modules
    • Services
    • Tools
  • Home
  • About A-SIT
  • Imprint
  • Data Protection
  • Contact