Skip to content Skip to Navigation
A-SIT Technologie

Main Navigation

  • About A-SIT
  • License Agreement
  • Sitemap
  • Deutsch
  • English
  • eID & eSignature
  • eGovernment
  • Mobile & Cloud
  • IT Security
  • Software
    • Open Source Modules
    • Services
    • Tools
  • Archive
Home IT Security (: Seite 8)

Category: IT Security

Privacy-preserving Verifiable Data Audits

posted in #eGovernment, IT Security on the 28.09.2020

The main aim of this project was to build a prototype system that adds transparency to the way different parties […]

Semantic Search of Related Patterns in Source Code

posted in #IT Security, Mobile & Cloud on the 13.09.2020

The analysis of source code for security-critical elements can be supported by tools that search for certain predefined patterns in […]

SSI Offline-Verifiable Attributes

posted in #eGovernment, IT Security on the 10.09.2020

In a world with an increasing number of online services, digital identities become more and more important. Even in eGovernment, […]

Privacy-Preserving Service Composition

posted in #eGovernment, IT Security on the 25.08.2020

Service compositions are implemented through the interplay between actors of different organizations. Many composition systems use a middleware, which coordinates […]

Analysis of Electroneum Cloud Mining

posted in #IT Security, Mobile & Cloud on the 27.07.2020

Electroneum is one of the first cryptocurrencies that allows users to mine coins with a mobile device. Electroneum’s Cloud Mining […]

iOS Interface for Network Traffic Logging

posted in #IT Security, Mobile & Cloud on the 15.06.2020

This project investigates three methods to record and analyze network traffic on an iOS device. In the first approach, methods […]

Similarity of Android Applications via Deep Learning

posted in #IT Security, Mobile & Cloud on the 27.04.2020

In view of the unbroken popularity of applications for the Android mobile platform, there are numerous apps in the “App […]

Gap Analysis of Data Transparency Logging Architectures

posted in #eGovernment, IT Security on the 22.04.2020

The General Data Protection Regulation (GDPR) specifies a series of transparency obligations for data controllers concerning the processing and sharing […]

Systematic Analysis of the Fingerprintability of Android

posted in #IT Security, Mobile & Cloud on the 6.04.2020

This report presents a framework that can automatically recognize fingerprintable information sources on Android devices. For this purpose it automatically […]

Analysis of the Bitcoin UTXO Set

posted in #IT Security, Mobile & Cloud on the 26.03.2020

This project describes and analyzes the set of unspent transaction outputs (UTXO set) in Bitcoin. The UTXO set contains all […]

Posts navigation

Older posts
Newer posts
Categories
  • Archive
  • eGovernment
  • eID & eSignature
  • IT Security
    • Privacy-Preserving Computation
  • Mobile & Cloud
  • News
  • Software
    • Open Source Modules
    • Services
    • Tools
  • Home
  • About A-SIT
  • Imprint
  • Data Protection
  • Contact