The behavioral analysis of mobile applications for Apple iOS is still a very challenging procedure, both in terms of time […]
News
CA-less Authentication of Cloud Services
This project evaluates different authentication methods that can be used to authenticate services and entities without relying on a CA. Recent […]
Orchestration of distributed cloud applications
Development of a meta-model for categorizing Web-APIs. Today, many web services offer a separate interface in the form of a […]
Technology Overview Blockchain
As part of this project, a survey on Distributed Ledger Technologies (commonly referred to as Blockchain) was conducted. The attached […]
Analysis of Car Applications
This survey evaluates the state of the art of mobile applications for cars. It gives an overview of popular mobile […]
Contextual Data Exchange
We present a reusable data structure that addresses the issues of static, inflexible and practically non-interoperable authorization definitions. We first […]
Flexible Two-Factor Authentication with FIDO
FIDO Universal Second Factor (U2F) is an industry standard for a generally applicable two-factor authentication. Using a USB security token […]
Server-Side Solutions for Cloud-Based Mobile Augmentation
Mobile devices are becoming increasingly powerful, but also consume increasingly more power. For this reason, frameworks have been developed in […]
Dynamic Key Usage Policies
More and more data and resources are moved to the cloud. Even cryptographic primitives do benefit from the advantages of […]
Certificate Status Application
The Certificate Status Tool is designed to provide certificate status information based on manually defined trust anchors as well as […]