Self-Sovereign Identity (SSI) represents a recent identity model that enhances the user-centric identity model. SSI utilizes distributed ledger technoloy to […]
News
Android Application Patching Through Runtime Manipulation
Application patching is a promising concept for modifying the execution flow of a compiled Android application for the purpose of […]
Anonymous Service Consumption for Service Composition Systems
Service compositions are implemented through the interplay between actors of different organizations. To protect the privacy of a service consumer’s […]
Security Architecture for Digital Twins
The concept of digital twins has gained traction over recent years. A digital twin is a digital representation of a […]
Incremental Bitcoin Snapshots
This project presents an architecture for a compressible blockchain, which supplements the primary blockchain with a second linked blockchain. This […]
Influence of Vendor Customisations on Device Security
In order to differentiate devices from other manufacturers and offer users added value, manufacturers of Android smartphones customize their devices. […]
New Trust Models based on Trusted Computing
Traditionally, two basic approaches to implementing trust models exist. On the one hand, there is hierarchical trust (most prominently standardised […]
Security Analysis of Mobile Applications for Crypto-Currencies
To manage virtual currencies such as Bitcoin or Ethereum, many users turn to mobile apps that promise a convenient form […]
Digital ID cards: Study and analysis of properties
Physical credentials are omnipresent in our everyday lives. Either in the form of a bank card, driving license, certificate, health […]
SSI Strong Authentication
Self-Sovereign Identity (SSI) is a new identity model, which aims to eliminate central trusted parties. Digital wallets are often used […]