We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Qualified Remote Signatures – Solutions, its Certification, and Use
Leitold H., Konrad D.
Proceedings of 29th SmartCard Workshop, 219-231
Erfahrungen aus eIDAS Zertifizierung
Leitold H., Konrad D.
Datenschutz und Datensicherheit, Vol. 42(7), 429-433
SUNFISH ID1v2 – Identity Management and Access Control at Work
Reiter A., Suzic B., Leitold H., Marsalek A., Prünster B., Ziegler D.
STORK: a real, heterogeneous, large-scale eID management system
Ribeiro C., Leitold H., Esposito S., Mitzman D.
International Journal of Information Security
Privacy Technologies and Policy
Schweighofer E., Leitold H., Mitrakas A., Rannenberg K.
, Springer Verlag
SUNFISH ID1v1 – Identity Management and Access Control
Reiter A., Suzic B., Leitold H., Marsalek A., Prünster B., Ziegler D.
FutureTrust - Future Trust Services for Trustworthy Global Transactions
Hühnlein D., Frosch T., Schwenk J., Piswanger C., Sel M., Hühnlein T., Wich T., Nemmert D., Lottes R., Baszanowski S., Zeuner V., Rauh M., Somorovsky J., Mladenov V., Condovici C., Leitold H., Stalla-Bourdillon S., Tsakalakis N., Eichholz J., Kamm F., Urmann J., Kühne A., Wabisch D., Dean R., Shamah J., Kapanadze M., Ponte N., Martins J., Portela R., Karabat ., Stojičić S., Nedeljkovic S., Bouckaert V., Defays A., Anderson B., Jonas M., Hermanns C., Schubert T., Wegener D., Sazonov A.
Open Identity Summit 2016, Open Identity Summit 2016, 27, (Lecture Notes in Informatics; vol. P-264)
GDPR & ePrivacy
Leitold H., Schweighofer E., Mitrakas A., Rannenberg K.
, Österreichische Computergesellschaft
SUNFISH D2.2 – Requirement Definition and Threat Model
Reiter A., Suzic B., Leitold H., Cassar J., Nicoletti L., Rozenberg B., Jones C.
SUNFISH D2.1 – State of the Art and Legal Aspects
Reiter A., Leitold H., Suzic B., Reimair F., Moffie M., Cordina D., Pullonen P., Pettai M., Kubo B., Venturi D.
STORK 2.0: Breaking New Grounds on eID and Mandates
Leitold H., Lioy A., Ribeiro C.
Proceedings of ID World International Congress, 2014 ID World International Congress, 1-8
Supporting Decision Making and Policy Through Large Scale Pilots
Leitold H.
Advances in Human Factors and Ergonomics 2014, 5th International Conference on Applied Human Factors and Ergonomics, 2669-2679
Middleware Architecture for Cross-Border Identification and Authentication
Zwattendorfer B., Sumelong I., Leitold H.
Journal of Information Assurance and Security , Vol. 8(3), 107-118
Semantic Pattern Transformation
Teufl P., Leitold H., Posch R.
Proceedings of the 13th International Conference on Knowledge Management and Knowledge Technologies, Association of Computing Machinery, 0-0
The INDI Ecosystem of privacy-aware, user-centric Identity
Leontaridis L., Andersson T., Leitold H., Zwattendorfer B., Yang S., Lindholm P.
ISSE 2013 - Securing Electronic Business Processes, 2013 Information Security Solutions Europe Conference, 45-57
Technology-Enabled Innovation for Democracy, Government and Governance
Leitold H., Kö A., Leitner C., Prosser A.
, Springer, (LNCS)
STORK - Technical Approach and Privacy
Leitold H., Posch R.
Digital Enlightenment Yearbook 2012, IOS Press, 289-306
Middleware Architecture for Cross-Border eID
Zwattendorfer B., Sumelong I., Leitold H.
International Conference on Information Assurance and Security, International Conference on Information Assurance and Security, 303-308
Advancing Democracy, Government and Governance
Kö A., Leitner C., Leitold H., Prosser A.
, Springer, (LNCS)
Mobile qualifizierte Signaturen in Europa
Zefferer T., Teufl P., Leitold H.
Datenschutz und Datensicherheit, 768-773