In a world with an increasing number of online services, digital identities become more and more important. Even in eGovernment, […]
Category: IT Security
Privacy-Preserving Service Composition
Service compositions are implemented through the interplay between actors of different organizations. Many composition systems use a middleware, which coordinates […]
Analysis of Electroneum Cloud Mining
Electroneum is one of the first cryptocurrencies that allows users to mine coins with a mobile device. Electroneum’s Cloud Mining […]
iOS Interface for Network Traffic Logging
This project investigates three methods to record and analyze network traffic on an iOS device. In the first approach, methods […]
Similarity of Android Applications via Deep Learning
In view of the unbroken popularity of applications for the Android mobile platform, there are numerous apps in the “App […]
Gap Analysis of Data Transparency Logging Architectures
The General Data Protection Regulation (GDPR) specifies a series of transparency obligations for data controllers concerning the processing and sharing […]
Systematic Analysis of the Fingerprintability of Android
This report presents a framework that can automatically recognize fingerprintable information sources on Android devices. For this purpose it automatically […]
Analysis of the Bitcoin UTXO Set
This project describes and analyzes the set of unspent transaction outputs (UTXO set) in Bitcoin. The UTXO set contains all […]
Technical Analysis of the General Transparency Paradigm
This project analyzed alternative ways to enable transparency for stakeholders in a trust service-based ecosystem, besides traditional third-party certification. One […]
Implementation of an editable proof-of-work based blockchain
In this project, we developed a demonstrator for an editable proof-of-work based blockchain in Java and Kotlin. The blockchain end […]