Skip to main content

and
  1. Chapter and Conference Paper

    A Security Analysis of FirstCoin

    Supported by the current hype on Bitcoin, the number of available cryptocurrencies has steadily increased over the past years. Currently, relevant portals list more than 1.500 cryptocurrencies. Many of them sl...

    Alexander Marsalek, Christian Kollmann in ICT Systems Security and Privacy Protection (2018)

  2. No Access

    Chapter and Conference Paper

    SeDiCom: A Secure Distributed Privacy-Preserving Communication Platform

    Efficient and secure electronic communication is crucial for successful business-to-business processes. Due to the weaknesses of e-mail communication, a shift towards instant messaging can also be observed in ...

    Alexander Marsalek, Bernd Prünster, Bojan Suzic in Information Systems Security (2018)

  3. No Access

    Chapter and Conference Paper

    Balancing Utility and Security: Securing Cloud Federations of Public Entities

    Following their practical needs and legal constraints, recent application of the cloud paradigm among public administrations has been focused on the deployment of private clouds. Due to the increasing amount o...

    Bojan Suzic, Bernd Prünster, Dominik Ziegler in On the Move to Meaningful Internet Systems… (2016)

  4. No Access

    Chapter and Conference Paper

    Android Security Permissions – Can We Trust Them?

    The popularity of the Android System in combination with the lax market approval process may attract the injection of malicious applications (apps) into the market. Android features a permission system allowin...

    Clemens Orthacker, Peter Teufl in Security and Privacy in Mobile Information… (2012)

  5. No Access

    Chapter and Conference Paper

    Android Market Analysis with Activation Patterns

    The increasing market share of the Android platform is partly caused by a growing number of applications (apps) available on the Android market: by now (January 2011) roughly 200.000. This popularity in combin...

    Peter Teufl, Stefan Kraxberger in Security and Privacy in Mobile Information… (2012)