We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Qualified Remote Signatures – Solutions, its Certification, and Use
Leitold H., Konrad D.
Proceedings of 29th SmartCard Workshop
Erfahrungen aus eIDAS Zertifizierung
Leitold H., Konrad D.
Datenschutz und Datensicherheit, Vol. 42(7), 2018
SUNFISH ID1v2 – Identity Management and Access Control at Work
Reiter A., Suzic B., Leitold H., Marsalek A., Prünster B., Ziegler D.
2017
STORK: a real, heterogeneous, large-scale eID management system
Ribeiro C., Leitold H., Esposito S., Mitzman D.
International Journal of Information Security, 2017
Privacy Technologies and Policy
Schweighofer E., Leitold H., Mitrakas A., Rannenberg K.
Springer Verlag, 2017
SUNFISH ID1v1 – Identity Management and Access Control
Reiter A., Suzic B., Leitold H., Marsalek A., Prünster B., Ziegler D.
2017
FutureTrust - Future Trust Services for Trustworthy Global Transactions
Hühnlein D., Frosch T., Schwenk J., Piswanger C., Sel M., Hühnlein T., Wich T., Nemmert D., Lottes R., Baszanowski S., Zeuner V., Rauh M., Somorovsky J., Mladenov V., Condovici C., Leitold H., Stalla-Bourdillon S., Tsakalakis N., Eichholz J., Kamm F., Urmann J., Kühne A., Wabisch D., Dean R., Shamah J., Kapanadze M., Ponte N., Martins J., Portela R., Karabat ., Stojičić S., Nedeljkovic S., Bouckaert V., Defays A., Anderson B., Jonas M., Hermanns C., Schubert T., Wegener D., Sazonov A.
Open Identity Summit 2016
GDPR & ePrivacy
Leitold H., Schweighofer E., Mitrakas A., Rannenberg K.
Österreichische Computergesellschaft, 2016
SUNFISH D2.2 – Requirement Definition and Threat Model
Reiter A., Suzic B., Leitold H., Cassar J., Nicoletti L., Rozenberg B., Jones C.
2015
SUNFISH D2.1 – State of the Art and Legal Aspects
Reiter A., Leitold H., Suzic B., Reimair F., Moffie M., Cordina D., Pullonen P., Pettai M., Kubo B., Venturi D.
2015
STORK 2.0: Breaking New Grounds on eID and Mandates
Leitold H., Lioy A., Ribeiro C.
Proceedings of ID World International Congress
Supporting Decision Making and Policy Through Large Scale Pilots
Leitold H.
Advances in Human Factors and Ergonomics 2014
Semantic Pattern Transformation
Teufl P., Leitold H., Posch R.
Proceedings of the 13th International Conference on Knowledge Management and Knowledge Technologies
Middleware Architecture for Cross-Border Identification and Authentication
Zwattendorfer B., Sumelong I., Leitold H.
Journal of Information Assurance and Security , Vol. 8(3), 2013
The INDI Ecosystem of privacy-aware, user-centric Identity
Leontaridis L., Andersson T., Leitold H., Zwattendorfer B., Yang S., Lindholm P.
ISSE 2013 - Securing Electronic Business Processes
Technology-Enabled Innovation for Democracy, Government and Governance
Leitold H., Kö A., Leitner C., Prosser A.
Springer, 2013
STORK - Technical Approach and Privacy
Leitold H., Posch R.
Digital Enlightenment Yearbook 2012, IOS Press, 289-306, 2012
Middleware Architecture for Cross-Border eID
Zwattendorfer B., Sumelong I., Leitold H.
International Conference on Information Assurance and Security
Advancing Democracy, Government and Governance
Kö A., Leitner C., Leitold H., Prosser A.
Springer, 2012
Mobile qualifizierte Signaturen in Europa
Zefferer T., Teufl P., Leitold H.
Datenschutz und Datensicherheit, 2011
