In this project, selected NFC-enabled electronic authentication solutions are compared. The German AusweisApp 2, the Italian SPID solution, and the […]
News
Correctness, Completeness, and Non-Repudiation of Transparency Logs
Correctness and Completeness of are two desirable features for Transparency Logs. Unfortunately, when it comes to data processing events, these […]
MOA-SP/SS
The functionality of MOA SP and MOA SS can be called both via the Web service interface (SOAP) as well […]
PDF-AS
A Citizen Card Environment, a MOA-SS instance, a PKCS12 file or a Java KeyStore can be used as a signature creation unit. Here, […]
Compressible Blockchain
In this project, we propose a compressible blockchain. The main idea is to use a second, linked chain that stores […]
DIGITAL ID CARDS
Physical credentials are omnipresent in our everyday lives. Either they are in the form of a bank card, driving license, […]
Modeling of fingerprintable information sources
The report presents a model that classifies fingerprintable information sources. The permission system of the Android operating system was used […]
IPFS Security Analysis
During this project, IPFS, a decentralized peer-to-peer hypermedia system, was subjected to a security analysis. Vulnerabilities with serious consequences could […]
IoT Devices in Service Compositions
Online applications are often composed of services provided by multiple service providers. In some cases, a service consumer may want […]
Providing Smartphone Features on the Desktop
Current personal computing devices, such as smartphones, laptops, and traditional desktop computers, are geared towards different applications and use cases, […]