Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Stephan Spitz is active.

Publication


Featured researches published by Stephan Spitz.


trust and privacy in digital business | 2012

Secure Embedded Platform with Advanced Process Isolation and Anonymity Capabilities

Marc-Michael Bergfeld; Holger Bock; Roderick Bloem; Jan Blonk; Gregory Conti; Kurt Dietrich; Matthias Junk; Florian Schreiner; Stephan Spitz; Johannes Winter

Mobile and embedded devices are increasingly popular: well over a million smart-phones were sold each day in 2011. These devices have changed from simple single-purpose tools, to powerful multifunctional personal computers, providing the owner with functionality previously only available on much more powerful desktop computers.


workshop in information security theory and practice | 2007

Mobile phones as secure gateways for message-based ubiquitous communication

Walter Bamberger; Oliver Welter; Stephan Spitz

For ubiquitous communication self-organising adhoc networks become more and more important. We consider mobile phones as an appropriate trusted gateway for external machines with low communication needs. A message-based approach is best in such a scenario with moving mobile phones and machines. We propose a security model for access control to the communication infrastructure that is also message-based. To meet the requirements of ubiquitous communicating machines, all algorithms on the senders side are based on symmetric cryptography resulting in low computation needs. A sophisticated symmetric key infrastructure for message authentication provides the necessary key management. The trustworthiness of the mobile phone is achieved by using the SIM as a secure storage and computing module. This makes it possible to use the mobile phone not only as a user terminal but also as a trusted infrastructure component of the mobile network.


Privacy and Identity Management for Life | 2011

Privacy and Identity Management on Mobile Devices: Emerging Technologies and Future Directions for Innovation

Marc-Michael Bergfeld; Stephan Spitz

Secure Elements have been around as identity providing modules in Mobile Services since the creation of the Mobile Phone Industry. With an increasingly dynamic environment of Mobile Services and multiple Mobile Devices, however, and with an ever changing ecosystem, characterized by new value chain entrants, new (partial) identities need to be provided for the end users. Here, emerging Secure Elements such as Stickers and Secure SD cards can be leveraged in addition to the omnipresent SIM card / UICC. For future services though, even more flexible, secure and privacy enhanced Secure Elements, such as Trusted Execution Environments can be expected. They are needed to cope with an ever more dynamic Mobile Services environment that depends upon reliable, partial identities of the end users and increasingly calls for privacy and security measures. This chapter elaborates upon the emerging and future Secure Element technologies for Mobile Devices. These technologies shall allow an increasingly dynamic creation of services between front-end Mobile Devices and back-end Servers. The Chapter sets the current developments of the ecosystem for Mobile Services into perspective with the needed technologies, reflects on the contributions of the PrimeLife project and draws attention towards the still needed future directions of innovation.


Innovations in Systems and Software Engineering | 2006

ISOIIEC 24727 — A Future Standard for Smart Card Middleware

Stephan Spitz; Jens Urmann; Gisela Meister

This paper describes the features of the future-oriented ISO/IEC 24727 smart card middleware standard for a broad audience; i.e., from a basic to a good technical understanding. Not only technical aspects are covered, but business and market aspects as well.


Archive | 2011

Method for provisioning of a network access for a mobile communication device

Stephan Spitz; Hermann Sterzinger; Robert John Brown


Archive | 2009

PORTABLE DATA CARRIER COMPRISING A CAT INTERPRETER

Oliver Richter; Stephan Spitz; Hao Chen


Archive | 2012

Microprocessor system with secured runtime environment

Stephan Spitz; Markus Köhler; Ullrich Martini


Archive | 2008

Verfahren zum ausführen einer applikation mit hilfe eines tragbaren datenträgers

Stephan Spitz; Walter Hinz


Archive | 2007

METHOD FOR EXECUTING AN APPLICATION WITH THE AID OF A PORTABLE DATA STORAGE MEDIUM

Stephan Spitz; Walter Hinz


Archive | 2010

Method for securely interacting with a security element

Stephan Spitz; Lutz Hammerschmid

Collaboration


Dive into the Stephan Spitz's collaboration.

Researchain Logo
Decentralizing Knowledge