![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
A Security Analysis of FirstCoin
Supported by the current hype on Bitcoin, the number of available cryptocurrencies has steadily increased over the past years. Currently, relevant portals list more than 1.500 cryptocurrencies. Many of them sl...
-
Chapter and Conference Paper
SeDiCom: A Secure Distributed Privacy-Preserving Communication Platform
Efficient and secure electronic communication is crucial for successful business-to-business processes. Due to the weaknesses of e-mail communication, a shift towards instant messaging can also be observed in ...
-
Chapter and Conference Paper
Balancing Utility and Security: Securing Cloud Federations of Public Entities
Following their practical needs and legal constraints, recent application of the cloud paradigm among public administrations has been focused on the deployment of private clouds. Due to the increasing amount o...
-
Chapter and Conference Paper
Android Security Permissions – Can We Trust Them?
The popularity of the Android System in combination with the lax market approval process may attract the injection of malicious applications (apps) into the market. Android features a permission system allowin...
-
Chapter and Conference Paper
Android Market Analysis with Activation Patterns
The increasing market share of the Android platform is partly caused by a growing number of applications (apps) available on the Android market: by now (January 2011) roughly 200.000. This popularity in combin...