Herbert Leitold

According to our database1, Herbert Leitold authored at least 30 papers between 1996 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
STORK: a real, heterogeneous, large-scale eID management system.
Int. J. Inf. Sec., 2018

Erfahrungen aus eIDAS Zertifizierung.
Datenschutz und Datensicherheit, 2018

2016

2015
SSEDIC.2020 on mobile eid.
Proceedings of the Open Identity Summit 2015, 10-11 November 2015, Berlin, Germany, 2015

2013
The INDI Ecosystem of privacy-aware, user-centric Identity.
Proceedings of the ISSE 2013, 2013

Semantic Pattern Transformation: Applying Knowledge Discovery Processes in Heterogeneous Domains.
Proceedings of the 13th International Conference on Knowledge Management and Knowledge Technologies, 2013

2012
Middleware architecture for cross-border eID.
Proceedings of the Fourth International Conference on Computational Aspects of Social Networks, 2012

2011
Mobile qualifizierte Signaturen in Europa - Konzepte zur Vereinfachung elektronischer Signaturen durch die Verwendung mobiler Endgeräte.
Datenschutz und Datensicherheit, 2011

STORK e-privacy and security.
Proceedings of the 5th International Conference on Network and System Security, 2011

2010
Reconstruction of electronic signatures from eDocument printouts.
Comput. Secur., 2010

Challenges of eID Interoperability: The STORK Project.
Proceedings of the Privacy and Identity Management for Life, 2010

STORK: Architecture, Implementation and Pilots.
Proceedings of the ISSE 2010, 2010

2009
Media-Break Resistant eSignatures in eGovernment: An Austrian Experience.
Proceedings of the Emerging Challenges for Security, 2009

2005
E-Voting: A Scalable Approach using XML and Hardware Security Modules.
Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 2005), 29 March, 2005

2002
Identification and Confidentiality for e-Government.
Proceedings of the Certification and Security in E-Services, From E-Govenment to E-Business, IFIP 17<sup>th</sup> World Computer Congress, 2002

An open interface enabling secure e-government.
Proceedings of the Advanced Communications and Multimedia Security, 2002

Security Architecture of the Austrian Citizen Card Concept.
Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), 2002

2001
Digitale Signaturen in der Praxis.
Proceedings of the Tagungsband der GI/OCG-Jahrestagung - 31. Jahrestagung der Gesellschaft für Informatik, Wirtschaft und Wissenschaft in der Network Economy, 2001

2000
Robustness-Agile Encryptor for ATM Networks.
Proceedings of the Information Security for Global Information Infrastructures, 2000

Independent Policy Oriented Layering of Security Services.
Proceedings of the Information Security for Global Information Infrastructures, 2000

A 155 Mbps Triple-DES Network Encryptor.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2000

1999
ATM Network Security: Requirements, Approaches, Standards, and the SCAN Solution.
Proceedings of the Intelligence in Networks, 1999

A Survey of Research, Products, and Standards - Extended Abstract of the Mini-Tutorial.
Proceedings of the Intelligence in Networks, 1999

ISDN Security services.
Proceedings of the Secure Information Networks: Communications and Multimedia Security, 1999

Secure Communications in ATM Networks.
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), 1999

1998
Securing multimedia services over satellite ATM networks.
Int. J. Satell. Commun. Netw., 1998

A Hardware-Independent Encryption Model for ATM Devices.
Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC 1998), 1998

1996
LAN Access Over ISDN.
J. Univers. Comput. Sci., 1996

ISDN LAN Access: Remote Access Security and User Profile Management.
Proceedings of the Communications and Multimedia Security II, 1996

A study of TCP/IP throughout performance in heterogeneous ATM local area networks.
Proceedings of the ATM Networks, 1996


  Loading...