ego.bib

@patent{patent2006poly,
  nationality = {EP},
  number = {EP Patent 1,859,344; WO Patent WO/2006/092,448},
  author = {Peter Langendoerfer and Zoya Dyka and Steffen Peter},
  title = {Method and device for calculating a polynom multiplication, in particular for elliptical curve cryptography},
  mylink = {http://www.google.com/patents/WO2006092448A2}
}
@patent{patent2007us,
  nationality = {US},
  number = {EP Patent 1,999,571, US Patent 20100061547, WO Patent WO2007107592A2},
  year = {2007},
  author = {Peter Langendoerfer and Steffen Peter},
  title = {Method and device for reducing a polynomial in a binary finite field, in particular for a cryptographic application},
  mylink = {http://www.google.com/patents/WO2007107592A2}
}
@patent{patent2008peter,
  number = {EP Patent 2118739, US Patent 20100095133, WO Patent 2008096004},
  year = {2008},
  author = {Steffen Peter and Michael Methfessel and Peter Langendoerfer and Frank
	Vater},
  title = {REDUCTION OF SIDE CHANNEL INFORMATION BY INTERACTING CRYPTO BLOCKS},
  mylink = {http://www.google.com/patents/WO2008096004A1}
}
@patent{patent2009vater,
  nationality = {DE},
  number = {DE Patent 102,007,031,131},
  year = {2009},
  author = {Frank Vater and Ulrich Jagdhold and Steffen Peter and Langend{oe}rfer,
	Peter},
  title = {Takt{\"u}berwachungsschaltung mit interner Referenztaktquelle},
  language = {german},
  mylink = {http://worldwide.espacenet.com/publicationDetails/biblio?CC=DE&NR=102007031131A1}
}
@patent{methfessel2009einchipsystem,
  author = {Michael Methfessel and Steffen Peter and Mario Zessack},
  title = {Einchipsystem},
  year = {2009},
  number = {DE Patent 102,007,037,064},
  mylink = {http://www.freepatentsonline.com/DE102007037064B4.html}
}
@patent{patent2012bluetooth,
  nationality = {EP},
  number = {EP Patent 2582182},
  author = {Michael Methfessel and Steffen Peter},
  title = {Bluetooth scatternet tree formation for wireless sensor networks},
  mylink = {http://www.google.com/patents/EP2582182A1}
}
@article{langend2007crosslayer,
  author = {Peter Langendoerfer and Krzysztof Piotrowski and Steffen Peter and
	Martin Lehmann},
  title = {Crosslayer firewall interaction as a means to provide effective and
	efficient protection at mobile devices},
  journal = {Computer Communications},
  year = {2007},
  volume = {30},
  pages = {1487--1497},
  number = {7},
  address = {Newton, MA, USA},
  issn = {0140-3664},
  publisher = {Butterworth-Heinemann},
  mydoc = {langendoerfer2007crosslayer.pdf}
}
@article{langend2008privacy,
  author = {Peter Langendoerfer and Michael Maaser and Krzysztof Piotrowski and
	Steffen Peter},
  title = {Privacy-Enhancing Technique: A Survey and Classification},
  journal = {Handbook of Research on Wireless Security},
  year = {2008},
  pages = {115-128},
  mydoc = {langendoerfer2008privacy.pdf}
}
@article{peter2008ijsn,
  author = {Steffen Peter and Peter Langendoerfer and Krzysztof Piotrowski},
  title = {Public key cryptography empowered smart dust is affordable},
  journal = {International Journal of Sensor Networks},
  year = {2008},
  volume = {4},
  number = {1/2},
  mydoc = {IJSNET_peter.pdf}
}
@article{portilla2010adaptable,
  author = {Jorge Portilla and A. Otero and Eduardo de la Torre and Teresa  Riesgo and Oliver Stecklina and Seffen Peter and Peter Langend{oe}rfer},
  title = {Adaptable security in wireless sensor networks by using reconfigurable
	ECC hardware coprocessors},
  journal = {International Journal of Distributed Sensor Networks},
  year = {2010},
  volume = {2010},
  publisher = {Hindawi Publishing Corporation},
  mydoc = {portilla2010adaptable.pdf}
}
@article{peter2010survey,
  author = {Steffen Peter and Dirk Westhoff and Claude Castelluccia},
  title = {A survey on the encryption of convergecast traffic with in-network
	processing},
  journal = {IEEE Transactions on Dependable and Secure Computing},
  year = {2010},
  pages = {20--34},
  mydoc = {TDSC_peter.pdf}
}
@article{springer2014arap,
  title = {Adaptive Resource Synchronization In Hierarchical Real-Time Systems},
  author = {Tom Springer and Steffen Peter and Tony Givargis},
  journal = {ACM SIGBED Review},
  year = {2014},
  month = {December},
  number = {4},
  volume = {11},
  comment = {Special Issue on 4th Workshop on Adaptive and Reconfigurable Embedded Systems (EWiLi 2014)},
  mydoc = {springer2014arap.pdf}
}
@article{gunes2014survey,
  author = {Volkan Gunes and Steffen Peter and Tony Givargis and Frank Vahid},
  title = {A Survey on Concepts, Applications, and Challenges in Cyber-Physical Systems},
  journal = {KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS},
  year = {2014},
  pages = {4242--4268},
  volume = {8},
  number = {12},
  mydoc = {CPS-SURVEY-KSII-11-03-2014.pdf}
}
@article{peter2015sat,
  author = {Steffen Peter and Tony Givargis},
  author = {Peter, Steffen and Givargis, Tony},
  title = {Component-Based Synthesis of Embedded Systems Using Satisfiability Modulo Theories},
  journal = {ACM Transactions on Design Automation of Electronic Systems (TODAES)},
  issue_date = {September 2015},
  volume = {20},
  number = {4},
  month = sep,
  year = {2015},
  issn = {1084-4309},
  pages = {49:1--49:27},
  articleno = {49},
  numpages = {27},
  url = {http://doi.acm.org/10.1145/2746235},
  doi = {10.1145/2746235},
  publisher = {ACM},
  mydoc = {peter2015sat.pdf}
}
@inproceedings{piotrowski06sasn,
  author = {Krzysztof Piotrowski and Peter Langendoerfer and Steffen Peter},
  title = {How public key cryptography influences wireless sensor node lifetime},
  booktitle = {SASN '06: Proceedings of the fourth ACM workshop on Security of ad
	hoc and sensor networks},
  year = {2006},
  pages = {169--176},
  mydoc = {SASN_piotrowski.pdf},
  myslides = {SASN_piotrowski.ppt}
}
@inproceedings{peter2007concealed,
  author = {Steffen Peter and Krzysztof Piotrowski and Peter Langendoerfer},
  title = {On concealed data aggregation for WSNs},
  booktitle = {IEEE Consumer Communications and Networking Conference (CCNC)},
  year = {2007},
  pages = {192--196},
  mydoc = {CCNC_peter.pdf},
  myslides = {CCNC_peter.ppt}
}
@inproceedings{peter2007mul,
  author = {Steffen Peter and Peter Langendoerfer},
  title = {An Efficient Polynomial Multiplier in GF(2m) and its Application
	to ECC Designs},
  booktitle = {DATE '07: Proceedings of the conference on Design, automation and
	test in Europe},
  year = {2007},
  pages = {1253--1258},
  address = {San Jose, CA, USA},
  publisher = {EDA Consortium},
  isbn = {978-3-9810801-2-4},
  location = {Nice, France},
  mydoc = {DATE_peter_polymul.pdf},
  myslides = {DATE_peter_polymul.ppt}
}
@inproceedings{peter2007reduction,
  author = {Steffen Peter and Peter Langendoerfer and Krzysztof Piotrowski},
  title = {Flexible hardware reduction for elliptic curve cryptography in GF(2m)},
  booktitle = {DATE '07: Proceedings of the conference on Design, automation and
	test in Europe},
  year = {2007},
  pages = {1259--1264},
  address = {San Jose, CA, USA},
  publisher = {EDA Consortium},
  isbn = {978-3-9810801-2-4},
  location = {Nice, France},
  mydoc = {DATE_peter_reduc.pdf},
  myslides = {DATE_peter_reduc.ppt}
}
@inproceedings{vater2007wistp,
  author = {Frank Vater and Peter Langendoerfer and Steffen Peter},
  title = {Combinatorial logic circuitry as means to protect low cost devices
	against side channel attacks},
  booktitle = {Information Security Theory and Practices. Smart Cards, Mobile and
	Ubiquitous Computing Systems},
  year = {2007},
  pages = {244-253},
  publisher = {Springer},
  mydoc = {WISTP_vater.pdf},
  myslides = {WISTP_vater_slides.pdf}
}
@inproceedings{vater2008wess,
  author = {Frank Vater and Steffen Peter and Peter Langendoerfer},
  title = {An On-chip Security Monitoring Solution For System Clock For Low
	Cost Devices},
  booktitle = {3rd Workshop on Embedded Systems Security (WESS'2008) - A Workshop
	of the IEEE/ACM EMSOFT'2008 and the Embedded Systems Week},
  year = {2008},
  mydoc = {WESS_vater.pdf}
}
@inproceedings{langendoerfer2008middleware,
  author = {Peter Langendoerfer and Steffen Peter and Krzysztof Piotrowski and R Nunes.
	and A. Casaca},
  title = {{A Middleware Approach to Configure Security in WSN}},
  booktitle = {1st ERCIM Workshop on eMobility},
  year = {2007},
  mydoc = {ERCIM_langendoerfer.pdf},
  myslides = {ERCIM_langendoerfer.ppt}
}
@inproceedings{peter2008ina,
  author = {Steffen Peter and Krzysztof Piotrowski and Peter. Langendoerfer},
  title = {In-Network-Aggregation as Case Study for a Support Tool Reducing
	the Complexity of Designing Secure Wireless Sensor Networks},
  booktitle = {Proc. of the Third {IEEE} International Workshop on Practical Issues
	in Building Sensor Network Applications ({SenseApp})},
  year = {2008},
  mydoc = {SENSEAPP_peter.pdf}
}
@inproceedings{peter2008processor,
  author = {Steffen Peter and Mario Zessack and Frank Vater and Goran Panic and Horst Frankenfeldt and Michael Methfessel},
  title = {{An encryption-enabled network protocol accelerator}},
  booktitle = {Proceedings of the 6th international conference on Wired/wireless
	internet communications},
  year = {2008},
  pages = {79--91},
  mydoc = {WWIC_peter.pdf},
  myslides = {WWIC_peter.ppt}
}
@inproceedings{piotrowski2009tinydsm,
  author = {Krzysztof Piotrowski and Peter Langendoerfer and Steffen Peter},
  title = {{tinyDSM: A highly reliable cooperative data storage for Wireless
	Sensor Networks}},
  booktitle = {Collaborative Technologies and Systems, 2009. CTS'09. International
	Symposium on},
  year = {2009},
  pages = {225--232},
  mydoc = {DCSN_piotrowski.pdf},
  myslides = {DCSN_piotrowski.ppt}
}
@inproceedings{peter2009etfa,
  author = {Steffen Peter and Oliver Stecklina and Peter Langendoerfer},
  title = {{An engineering approach for secure and safe wireless sensor and
	actuator networks for industrial automation systems}},
  booktitle = {Emerging Technologies \& Factory Automation, 2009. ETFA 2009. IEEE
	Conference on},
  year = {2009},
  pages = {1--8},
  mydoc = {EFTA_peter.pdf},
  myslides = {ETFA_peter.ppt}
}
@inproceedings{peter2009reconfiguring,
  author = {Steffen Peter and Oliver Stecklina and Jorge Portilla and Eduardo de la
	Torre and Peter Langendoerfer and Teresa Riesgo},
  title = {Reconfiguring crypto hardware accelerators on wireless sensor nodes},
  booktitle = {Sensor, Mesh and Ad Hoc Communications and Networks Workshops, 2009.
	SECON Workshops' 09. 6th Annual IEEE Communications Society Conference
	on},
  year = {2009},
  pages = {1--3},
  mydoc = {DEMO_confcrypt.pdf}
}
@inproceedings{krimmling2010,
  author = {Jana Krimmling and Matthias Mahlig and Steffen Peter},
  title = {{Test of a Bluetooth Transmission Path for Process Automation - Test
	einer Bluetooth-Funkstrecke f{\"u}r die Prozessautomatisierung}},
  booktitle = {SPS/IPC/Drives 2010, Nuremberg},
  year = {2010},
  mydoc = {SPS_krimmling.pdf},
  myslides = {SPS_krimmling_slides.pdf}
}
@inproceedings{maye2010key,
  author = {Oliver Maye and Steffen Peter},
  title = {How key establishment in medical sensor networks benefits from near
	field communication technology},
  booktitle = {Green Computing and Communications (GreenCom), 2010 IEEE/ACM Int'l
	Conference on \& Int'l Conference on Cyber, Physical and Social Computing
	(CPSCom)},
  year = {2010},
  pages = {566--571},
  mydoc = {IOTS_maye.pdf}
}
@inproceedings{oppermann2010inferring,
  author = {Felix J. Oppermann and Steffen Peter},
  title = {Inferring Technical Constraints of a Wireless Sensor Network Application
	from End-User Requirements},
  booktitle = {2010 Sixth International Conference on Mobile Ad-hoc and Sensor Networks},
  year = {2010},
  pages = {169--175},
  mydoc = {MSN2010_peter.pdf}
}
@inproceedings{basmer2011implementation,
  author = {Thomas Basmer and Henry Schomann and Steffen Peter},
  title = {Implementation analysis of the IEEE 802.15. 4 MAC for wireless sensor
	networks},
  booktitle = {Mobile and Wireless Networking (iCOST), 2011 International Conference
	on Selected Topics in},
  year = {2011},
  pages = {7--12},
  organization = {IEEE},
  mydoc = {Basmer2011ImplementationAnalysis.pdf}
}
@inproceedings{panic2011sensor,
  author = {Goran Panic and Thomas Basmer and Oliver Schrape and Steffen Peter
	and Frank Vater and Klaus Tittelbach-Helmrich},
  title = {Sensor node processor for security applications},
  booktitle = {Electronics, Circuits and Systems (ICECS), 2011 18th IEEE International
	Conference on},
  year = {2011},
  pages = {81--84},
  mydoc = {GPanic-ICECS2011_final.pdf}
}
@inproceedings{methfessel2011bluetooth,
  author = {Michael Methfessel and Steffen Peter and Stefan Lange},
  title = {Bluetooth Scatternet Tree Formation for Wireless Sensor Networks},
  booktitle = {Mobile Adhoc and Sensor Systems (MASS), 2011 IEEE 8th International
	Conference on},
  year = {2011},
  pages = {789--794},
  mydoc = {Methfessel2011Bluetooth.pdf}
}
@inproceedings{dyka2012towards,
  author = {Zoya Dyka and Peter Langendoerfer and Frank Vater and Steffen Peter},
  title = {Towards Strong Security in Embedded and Pervasive Systems: Energy
	and Area Optimized Serial Polynomial Multipliers in GF (2k)},
  booktitle = {New Technologies, Mobility and Security (NTMS), 2012 5th International
	Conference on},
  year = {2012},
  pages = {1--6},
  mydoc = {dyka2012towards.pdf}
}
@inproceedings{panic2012design,
  author = {Goran Panic and Thomas Basmer and Henry Schomann and Steffen Peter
	and Frank Vater and Klaus Tittelbach-Helmrich},
  title = {Design of a sensor node crypto processor for IEEE 802.15. 4 applications},
  booktitle = {SOC Conference (SOCC), 2012 IEEE International},
  year = {2012},
  pages = {213--217},
  mydoc = {panic2012design.pdf}
}
@inproceedings{peter2012tool,
  author = {Steffen Peter and Peter Langendoerfer},
  title = {Tool-supported Methodology for Component-based Design of Wireless
	Sensor Network Applicationss},
  booktitle = {The 4th IEEE International Workshop on Component-Based Design of
	Resource-Constrained Systems, in conjunction with COMPSAC 2012 -
	the IEEE Signature Conference on Computers, Software, and Applications},
  year = {2012},
  mydoc = {peter-Methodology-CORCS2012.pdf},
  myslides = {peter-Methodology-CORCS2012.pptx}
}
@inproceedings{peter2013edu,
  author = {Steffen Peter and Frank Vahid and Daniel D. Gajski and Tony Givargis},
  title = {A Ball Goes to School - Our Experiences from a CPS Design Experiment},
  booktitle = {First NSF Workshop on CPS Education (at CPSWeek 2013)},
  year = {2013},
  mydoc = {peter2013edu.pdf},
  myposter = {ball_poster.pdf},
  myslides = {ball_presi.pptx}
}
@inproceedings{piotrowski2013sens4u,
  author = {Krzysztof Piotrowski and Steffen Peter},
  title = {Sens4U: Wireless Sensor Network Applications for Environment Monitoring
	Made Easy},
  booktitle = {Fourth International Workshop on Software Engineering for Sensor
	Network Applications (SESENA) In conjunction with ACM/IEEE International
	Conference on Software Engineering (ICSE)},
  year = {2013},
  mydoc = {piotrowski2013sesena.pdf},
  myslides = {sesena2013-sens4u.pptx}
}
@inproceedings{methfessel2013bluetooth,
  author = {Michael Methfessel and Stefan Lange and Rolf Kraemer and Mario Zessack and Peter Kollermann and Steffen Peter},
  title = {Real-Life Deployment of Bluetooth Scatternets for Wireless Sensor Networks},
  booktitle = {Fifth Workshop on Real-World Wireless Sensor Networks (RealWSN)},
  year = {2013},
  mydoc = {methfessel2013bluetooth.pdf}
}
@inproceedings{gunes2013modeling,
  author = {Volkan Gunes and Steffen Peter and Tony Givargis},
  title = {Modeling and Mitigation of Faults in Cyber-Physical Systems with Binary Sensors},
  booktitle = {13th IEEE International Conference on Computer and Information Technology (CIT)},
  year = {2013},
  mydoc = {gunes2013modeling.pdf}
}
@inproceedings{peter2013intervals,
  author = {Steffen Peter and Tony Givargis},
  title = {Utilizing Intervals in Component-based Design of Cyber Physical Systems},
  booktitle = {10th IEEE International Conference on Embedded Software and Systems (ICESS)},
  year = {2013},
  mydoc = {peter2013intervals.pdf}
}
@inproceedings{methfessel2013sensys,
  author = {Michael Methfessel and Stefan Lange and Rolf Kraemer and Mario Zessack and Steffen Peter},
  title = {Self-Organized Bluetooth Scatternets for Wireless Sensor Networks},
  booktitle = {11th ACM Conference on Embedded Networked Sensor Systems (SenSys)},
  year = {2013}
}
@inproceedings{xinfan2014sca,
  author = {Xin Fan and Steffen Peter and Milos Krstic},
  title = {From Old Ideas to New Questions - Exploring GALS Design for SCA Resistance},
  booktitle = {IEEE Symposium on Asynchronous Circuits and Systems (ASYNC 2014)},
  year = {2014}
}
@inproceedings{springer2014seus,
  title = {Resource Synchronization in Hierarchically Scheduled Real-Time Systems using Preemptive Critical Sections},
  author = {Springer, Tom and Peter, Steffen and Givargis, Tony},
  booktitle = {Object/Component/Service-Oriented Real-Time Distributed Computing (ISORC), 2014 IEEE 17th International Symposium on},
  year = {2014},
  mydoc = {springer2014seus.pdf}
}
@inproceedings{xinfan2014patmos,
  author = {Xin Fan and Steffen Peter and Milos Krstic},
  title = {GALS Design of ECC Against Side-Channel Attacks - A Comparative Study},
  booktitle = {Power and Timing Modeling, Optimization and Simulation (PATMOS)},
  year = {2014},
  mydoc = {xinfan2014patmos.pdf}
}
@inproceedings{krimmling2014ids_coap,
  author = {Jana Krimmling and Steffen Peter},
  title = {Integration and Evaluation of Intrusion Detection for CoAP in Smart City Applications},
  booktitle = {Communications and Network Security (CNS), 2014 IEEE Conference on},
  year = {2014},
  mydoc = {krimmling2014ids_coap.pdf}
}
@inproceedings{hamid2015variabilty,
  author = {Hamid Mirzaei and Steffen Peter and Tony Givargis},
  title = {Including Variability of Physical Models into the Design Automation of Cyber-Physical Systems},
  booktitle = {52nd Design Automation Conference (DAC), June 2015},
  year = {2015},
  mydoc = {hamid2015variability.pdf}
}
@inproceedings{gunes2015hvac,
  author = {Volkan Gunes and Steffen Peter and Tony Givargis},
  title = {Improving Energy Efficiency and Thermal Comfort of Smart Buildings with HVAC Systems in the Presence of Sensor Faults},
  booktitle = {to appear in 12th IEEE International Conference on Embedded Software and Systems (ICESS), August 2015},
  year = {2015},
  mydoc = {gunes2015hvac.pdf}
}
@inproceedings{springer2015ewili,
  title = {Fuzzy Logic Based Adaptive Hierarchical Scheduling for Periodic Real-Time Tasks},
  author = {Springer, Tom and Peter, Steffen and Givargis, Tony},
  booktitle = {to appear in The 5th Embedded Operating Systems Workshop (EWiLi), organized as part of Embedded Systems Week (ESWeek), October 2015},
  year = {2015},
  mydoc = {springer2015ewili.pdf}
}
@inproceedings{peter2015education,
  author = {Steffen Peter and Farshad Momtaz and Tony Givargis},
  title = {From the Browser to the Remote Physical Lab: Programming Cyber-physical Systems},
  booktitle = {to appear in
 IEEE Frontiers in Education (FIE) 2015, October 21-24, EL Paso Texas},
  year = {2015},
  mydoc = {peter2015education.pdf}
}
@phdthesis{peter2011diss,
  author = {Steffen Peter},
  title = {Tool-Supported Development of Secure Wireless Sensor Networks},
  school = {BTU Cottbus},
  year = {2011},
  mydoc = {diss_peter.pdf}
}
@misc{peter2010oldenburg,
  author = {Steffen Peter},
  title = {Tool-supported Composition of Software Modules for Safe and Secure
	Wireless Sensor Networks},
  howpublished = {Invited Talk: TrustSoft Graduate School on Trustworthy Software Systems;
	Carl von Ossietzky Universitat Oldenburg, June 2009},
  month = {6},
  year = {2009},
  myslides = {INVTALK_trustsoft.pdf}
}
@masterthesis{peter2006thesis,
  author = {Steffen Peter},
  title = {Evaluation of Design Alternatives for flexible Elliptic Curve Hardware
	Accelerators},
  school = {Brandenburgische Technische Universitaet Cottbus},
  year = {2006},
  mydoc = {da_peter.pdf}
}
@misc{peter2011monitoring,
  author = {Steffen Peter and Gerd Weber},
  title = {Monitoring drinking water pipelines - WSAN demonstrator in Frankfurt/Oder},
  journal = {Eurescom mess@ge},
  year = {2011},
  volume = {1},
  mylink = {http://www.eurescom.eu/?id=135}
}

This file was generated by bibtex2html 1.95.