Traces on the Internet

posted in #IT Security on the 16.08.2017

A study deals with daily activities on the Internet, which leave traces, and shows how these can be used to […]

Blockchain & Smart Contracts

posted in #IT Security on the 25.07.2017

This report explains different types of Blockchains as well as different consensus algorithms. Blockchain is a distributed ledger that consists […]

Rich End-to-End Encryption

posted in #IT Security on the 13.07.2017

This project discusses the requirements of a solution to decouple the authentication process from an application that uses the Skytrust […]