This project report starts by giving an overview of various data insertion methods available in Bitcoin. After this introduction, the report […]
News
Distributed Storage in Heterogeneous Environments
Cross-device, distributed storage is primarily established as a cloud-based service. Common alternatives to these often server-centric architectures typically allow either […]
Access Control of Finance APIs
The PSD2 Directive has redefined the framework for interfaces for payment service providers. In a study, we examine technical and […]
Classification of Mobile Applications via Metadata
In order to gain information about the context, purpose, and functionality of mobile applications and to classify them accordingly, this […]
Overview on E-Voting
A study provides an overview of the technical background on e-voting and shows ways in which e-voting could be implemented […]
Overview of Modern Cryptocurrencies
This study gives an overview of cryptocurrencies that are optimized for privacy or scalability. In detail, this study covers the […]
IoT-isolation via mini-router
This project shows the possibility to segregate IoT devices from the rest of the home network via an additional router. […]
Secure Peer-to-Peer Networking Based on Self-Certification
Peer-to-peer networks enable separation of identity (identifier) and location (network address). This separation makes it possible to implement virtual, homogeneous […]
Demonstrator IBE for Key Management
The project demonstrates an alternative approach of managing cryptographic keys in organisations (by using concepts of identity-based encryption). Key management […]
Whitepaper – Self-Sovereign Identity
Self-Sovereign Identity (SSI) is a new concept for electronic identities that is based upon the blockchain technology. With the blockchain […]