1.
Assaf, K., Mühle, A., Köhler, D., Meinel, C.: Prison Break: From Proprietary Data Sources to SSI Verifiable Credentials. International Conference on Advanced Information Networking and Applications. pp. 355–366. Springer (2023).
2.
Mühle, A., Assaf, K., Köhler, D., Meinel, C.: Requirements of a Digital Education Credential System. 2023 IEEE Global Engineering Education Conference (EDUCON). pp. 1–10. IEEE (2023).
3.
Hoops, F., Mühle, A., Matthes, F., Meinel, C.: A Taxonomy of Decentralized Identifier Methods for Practitioners. 2023 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS). pp. 57–65. IEEE (2023).
4.
Klieme, E., Trenz, P., Paeschke, D., Tietz, C., Meinel, C.: DoorCollect: Towards a Smart Door Handle for User Identification based on a Data Collection System for unsupervised Long-Term Experiments. 2021 IEEE Symposium on Computers and Communications (ISCC). pp. 1–7 (2021).
5.
Schmidt, K., Mühle, A., Grüner, A., Meinel, C.: Clear the Fog: Towards a Taxonomy of Self-Sovereign Identity Ecosystem Members. 18th Annual International Conference on Privacy, Security and Trust (PST). , Auckland, New Zealand (2021).
6.
Mühle, A., Grüner, A., Meinel, C.: Gotta Catch’em All! Improving P2P Network Crawling Strategies. 12th International Conference on Digital Forensics and Cybercrime. , Singpore, Singapore (2021).
Network crawling has been utilised to analyse peer- to-peer systems by academics and industry alike. However, accu- rately capturing snapshots is highly dependant on the crawlers’ speed as the network can be described as a moving target. In this paper, we present improvements based on the example of a newly developed Bitcoin crawler that can be utilised to reduce resource usage/requirements of crawlers and therefore speed up capturing network snapshots. To evaluate the new strategies, we compare our solution, in terms of increased scan rate and increased hit rate during crawling, to a popular open- source Bitcoin monitor. Blocking time is reduced on average to 1.52s, resulting in 94.7% higher scan rates, while time needed to capture a network snapshot is reduced on average by 9% due to increased hit rates during network crawling. While we show our improvements at the example of a new Bitcoin crawler, proven concepts can be transferred to other P2P networks as well.
7.
Ehrmann, L., Stolle, M., Klieme, E., Tietz, C., Meinel, C.: Detecting Interaction Activities While Walking Using Smartphone Sensors. In: Barolli, L., Woungang, I., and Enokido, T. (eds.) Advanced Information Networking and Applications. pp. 382–393. Springer (2021).
8.
Koehler, D., Klieme, E., Kreuseler, D., Cheng, F., Meinel, C.: Assessment of Remote Biometric Authentication Systems: Another Take on the Quest to Replace Passwords. Proceedings of 2021 IEEE 5th International Conference on Cryptography, Security and Privacy (CSP 2021). IEEE (2021).
9.
Mühle, A., Grüner, A., Meinel, C.: Characterising Proxy Usage in the Bitcoin Peer-to-Peer Network. 22nd International Conference on Distributed Computing and Networking (2021).
10.
Klieme, E., Wilke, J., van Dornick, N., Meinel, C.: FIDOnuous: A FIDO2/WebAuthn Extension to Support Continuous Web Authentication. 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). pp. 1857–1867 (2020).
11.
Tietz, C., Klieme, E., Brabender, R., Lasarow, T., Rambold, L., Meinel, C.: Under Pressure: Pushing Down on Me - Touch Sensitive Door Handle to Identify Users at Room Entry. In: Samarati, P., di Vimercati, S.D.C., Obaidat, M.S., and Ben-Othman, J. (eds.) Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, ICETE 2020 - Volume 2: SECRYPT, Lieusaint, Paris, France, July 8-10, 2020. pp. 565–571. ScitePress (2020).
12.
Tietz, C., Klieme, E., Behrendt, L., Böning, P., Marschke, L., Meinel, C.: Verification of Keyboard Acoustics Authentication on Laptops and Smartphones Using WebRTC. 2019 3rd Cyber Security in Networking Conference (CSNet). pp. 130–137 (2019).
13.
Mühle, A., Grüner, A., Gayvoronskaya, T., Meinel, C.: A survey on essential components of a self-sovereign identity. Computer Science Review. 30, 80–86 (2018).
This paper provides an overview of the Self-Sovereign Identity (SSI) concept, focusing on four different components that we identified as essential to the architecture. Self-Sovereign Identity is enabled by the new development of blockchain technology. Through the trustless, decentralised database that is provided by a blockchain, classic Identity Management registration processes can be replaced. We start off by giving a simple overview of blockchain based SSI, introducing an architecture overview as well as relevant actors in such a system. We further distinguish two major approaches, namely the Identifier Registry Model and its extension the Claim Registry Model. Subsequently we discuss identifiers in such a system, presenting past research in the area and current approaches in SSI in the context of Zooko’s Triangle. As the user of an SSI has to be linked with his digital identifier we also discuss authentication solutions. Most central to the concept of an SSI are the verifiable claims that are presented to relying parties. Resources in the field are only loosely connected. We will provide a more coherent view of verifiable claims in regards to blockchain based SSI and clarify differences in the used terminology. Storage solutions for the verifiable claims, both on- and off-chain, are presented with their advantages and disadvantages.
14.
Klieme, E., Tietz, C., Meinel, C.: Beware of SMOMBIES: Verification of Users Based on Activities While Walking. 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). pp. 651–660 (2018).