Peer-to-peer networks enable separation of identity (identifier) and location (network address). This separation makes it possible to implement virtual, homogeneous […]
News
Demonstrator IBE for Key Management
The project demonstrates an alternative approach of managing cryptographic keys in organisations (by using concepts of identity-based encryption). Key management […]
Whitepaper – Self-Sovereign Identity
Self-Sovereign Identity (SSI) is a new concept for electronic identities that is based upon the blockchain technology. With the blockchain […]
Merging Skytrust Tools
The project provides demonstrators to CrySIL (formerly “SkyTrust”). The Cryptographic Service Interoperability Layer (CrySIL), formerly known as Skytrust, complements applied cryptography […]
Android Browser – Security and Privacy
We investigated how advertisement blocking (ad blocking) can be implemented in Android browsers. Online advertising is growing rapidly. In 2007 […]
Multilateral Integration of XACML Policies
In this project an administrative model was extended to support the translation of abstract, semantic security policies into XACML policies. XACML […]
Secure Real-Time Textcollaboration
Tool for demonstrating secure real-time textcollaboration. Google Docs and Office 365 come to mind on cloud-based data processing. The success […]
Fingerprinting Code of Mobile Applications
The analysis of applications for mobile platforms (Android, iOS) has shown that security-relevant problems are often not to be found […]
Device Enrolment Using Flexible Authentication
In order to provide solutions such as managed devices to end users, we compiled concepts for authenticating devices, with a focus […]
Utilizing Policy Enforcement System to Control Mobile Distributed Applications
XACML is the de-facto standard in the area of data security policy languages. It enables to centralize the evaluation and […]