Security architecture of the austrian citizen card concept H Leitold, A Hollosi, R Posch Computer Security Applications Conference, 2002. Proceedings. 18th Annual …, 2002 | 142 | 2002 |
STORK: Architecture, Implementation and Pilots H Leitold, B Zwattendorfer Information Security Solutions Europe 2010 (ISSE 2010), Berlin, 131-142, 2010 | 48 | 2010 |
STORK: a real, heterogeneous, large-scale eID management system C Ribeiro, H Leitold, S Esposito, D Mitzam International Journal of Information Security 17, 569-585, 2018 | 31 | 2018 |
E-voting: A scalable approach using XML and hardware security modules T Rossler, H Leitold, R Posch IEEE International Conference on e-Technology, e-Commerce and e-Service 2005 …, 2005 | 27 | 2005 |
Challenges of eID Interoperability: The STORK Project H Leitold Privacy and Identity Management for Life, 144-150, 2011 | 23 | 2011 |
STORK e-privacy and security V Koulolias, A Kountzeris, H Leitold, B Zwattendorfer, A Crespo, M Stern 2011 5th International Conference on Network and System Security, 234-238, 2011 | 19 | 2011 |
Stork 2.0: Breaking new grounds on eid and mandates H Leitold, A Lioy, C Ribeiro ID World International Congress, 1-8, 2014 | 18 | 2014 |
SSEDIC. 2020 on Mobile eID M Kubach, H Leitold, H Roßnagel, CH Schunck, M Talamo Open Identity Summit 2015, 29-41, 2015 | 14 | 2015 |
Media-break resistant eSignatures in eGovernment: an Austrian experience H Leitold, R Posch, T Rössler Emerging Challenges for Security, Privacy, and Trust - 24th IFIP SEC, 109-118, 2009 | 14 | 2009 |
TCP/IP throughput performance evaluation for ATM local area networks I Andrikopoulos, T Ors, M Matijasevic, H Leitold, SPW Jones, R Porsch Proceedings of the IFIP TC6" Fourth Workshop on Performance Modeling and …, 1996 | 13 | 1996 |
Technology-Enabled Innovation for Democracy, Government and Governance: Second Joint International Conference on Electronic Government and the Information Systems Perspective … A Kö, C Leitner, H Leitold, A Prosser Springer, 2013 | 12 | 2013 |
Weißbuch Bürgerkarte R Posch, H Leitold | 11 | 2001 |
A 155 Mbps Triple-DES network encryptor H Leitold, W Mayerwieser, U Payer, K Posch, R Posch, J Wolkerstorfer Cryptographic Hardware and Embedded Systems—CHES 2000, 187-296, 2000 | 11 | 2000 |
Middleware Architecture for Cross-Border Identification and Authentication. B Zwattendorfer, I Sumelong, H Leitold Journal of Information Assurance & Security 8 (2), 2013 | 9 | 2013 |
Survey on EU’s Electronic-ID Solutions’ A Hayat, H Leitold, C Rechberger, T Rössler Secure Information Technology Center-Austria (A-SIT) 1 (10), 2004 | 9 | 2004 |
A hardware independent encryption model for ATM devices H Leitold, U Payer, R Posch 14th Annual Computer Security Applications Conference (ACSAC'98), 205-211, 1998 | 9 | 1998 |
FutureTrust–Future Trust Services for Trustworthy Global Transactions D Hühnlein, T Frosch, J Schwenk, CM Piswanger, M Sel, T Hühnlein, ... Challenges in Cybersecurity and Privacy-the European Research Landscape, 285-301, 2022 | 8 | 2022 |
Technology-Enabled Innovation for Democracy, Government and Governance ASITZ für sichere Informationstechnologie, A Kö, C Leitner, A Prosser Springer, 2013 | 8 | 2013 |
Identifying obstacles in moving towards an interoperable electronic identity management system A Hayat, R Posch, H Leitold 1st International Conference on Interoperability of eGovernment Services …, 2005 | 8 | 2005 |
Securing multimedia services over satellite ATM networks H Cruickshank, I Mertzanis, BG Evans, H Leitold, R Posch International journal of satellite communications 16 (4), 183-195, 1998 | 8 | 1998 |