A study deals with daily activities on the Internet, which leave traces, and shows how these can be used to […]
News
Blockchain & Smart Contracts
This report explains different types of Blockchains as well as different consensus algorithms. Blockchain is a distributed ledger that consists […]
Rich End-to-End Encryption
This project discusses the requirements of a solution to decouple the authentication process from an application that uses the Skytrust […]
LOD and LOV for Authorization Concepts
Vocabularies to represent security relevant concepts. Linked Open Data (LOD) and Linked Open Vocabularies (LOV) deal with the definition of […]
Traffic Analysis of Mobile Applications
As a supporting measure for the inspection of mobile applications, the data sent and received to/from the Internet has always […]
Citizen Card Encrypted (CCE)
CCE enables container-based encryption of files and folders. Encryption of data can be performed using smart-cards (hardware based keys, currently various versions of Austrian […]
Analysis of Browser-Extensions
This study deals with dangers potentially posed from browser extensions. Browser extensions can extend the functionality of modern web browsers […]
Migrating Edge Computing to Hybrid Edge Computing
This project shows that approaches, as they are followed by Edge Computing and Mobile Edge Computing are insufficient and further […]
State of the Art Services for Direct Communication
Direct data transfer and direct communication services are becoming increasingly relevant due to widespread availability of high bandwidth Internet connections. […]
Automated Reasoning over Security Policies
Applied approaches on authorization management often focus on a single system or environment, neglecting the need to address the security […]