[1] | Peter Langendoerfer, Zoya Dyka, and Steffen Peter. Method and device for calculating a polynom multiplication, in particular for elliptical curve cryptography. [ bib ] |
[2] | Peter Langendoerfer and Steffen Peter. Method and device for reducing a polynomial in a binary finite field, in particular for a cryptographic application, 2007. [ bib ] |
[3] | Steffen Peter, Michael Methfessel, Peter Langendoerfer, and Frank Vater. Reduction of side channel information by interacting crypto blocks, 2008. [ bib ] |
[4] | Frank Vater, Ulrich Jagdhold, Steffen Peter, and Peter Langendoerfer. Taktüberwachungsschaltung mit interner referenztaktquelle, 2009. [ bib ] |
[5] | Michael Methfessel, Steffen Peter, and Mario Zessack. Einchipsystem, 2009. [ bib ] |
[6] | Michael Methfessel and Steffen Peter. Bluetooth scatternet tree formation for wireless sensor networks. [ bib ] |
[7] | Peter Langendoerfer, Krzysztof Piotrowski, Steffen Peter, and Martin Lehmann. Crosslayer firewall interaction as a means to provide effective and efficient protection at mobile devices. Computer Communications, 30(7):1487-1497, 2007. [ bib ] |
[8] | Peter Langendoerfer, Michael Maaser, Krzysztof Piotrowski, and Steffen Peter. Privacy-enhancing technique: A survey and classification. Handbook of Research on Wireless Security, pages 115-128, 2008. [ bib ] |
[9] | Steffen Peter, Peter Langendoerfer, and Krzysztof Piotrowski. Public key cryptography empowered smart dust is affordable. International Journal of Sensor Networks, 4(1/2), 2008. [ bib ] |
[10] | Jorge Portilla, A. Otero, Eduardo de la Torre, Teresa Riesgo, Oliver Stecklina, Seffen Peter, and Peter Langendoerfer. Adaptable security in wireless sensor networks by using reconfigurable ecc hardware coprocessors. International Journal of Distributed Sensor Networks, 2010, 2010. [ bib ] |
[11] | Steffen Peter, Dirk Westhoff, and Claude Castelluccia. A survey on the encryption of convergecast traffic with in-network processing. IEEE Transactions on Dependable and Secure Computing, pages 20-34, 2010. [ bib ] |
[12] | Tom Springer, Steffen Peter, and Tony Givargis. Adaptive resource synchronization in hierarchical real-time systems. ACM SIGBED Review, 11(4), December 2014. [ bib ] |
[13] | Volkan Gunes, Steffen Peter, Tony Givargis, and Frank Vahid. A survey on concepts, applications, and challenges in cyber-physical systems. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 8(12):4242-4268, 2014. [ bib ] |
[14] | Steffen Peter and Tony Givargis. Component-based synthesis of embedded systems using satisfiability modulo theories. ACM Transactions on Design Automation of Electronic Systems (TODAES), 20(4):49:1-49:27, September 2015. [ bib | DOI | http ] |
[15] | Krzysztof Piotrowski, Peter Langendoerfer, and Steffen Peter. How public key cryptography influences wireless sensor node lifetime. In SASN '06: Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks, pages 169-176, 2006. [ bib ] |
[16] | Steffen Peter, Krzysztof Piotrowski, and Peter Langendoerfer. On concealed data aggregation for wsns. In IEEE Consumer Communications and Networking Conference (CCNC), pages 192-196, 2007. [ bib ] |
[17] | Steffen Peter and Peter Langendoerfer. An efficient polynomial multiplier in gf(2m) and its application to ecc designs. In DATE '07: Proceedings of the conference on Design, automation and test in Europe, pages 1253-1258, San Jose, CA, USA, 2007. EDA Consortium. [ bib ] |
[18] | Steffen Peter, Peter Langendoerfer, and Krzysztof Piotrowski. Flexible hardware reduction for elliptic curve cryptography in gf(2m). In DATE '07: Proceedings of the conference on Design, automation and test in Europe, pages 1259-1264, San Jose, CA, USA, 2007. EDA Consortium. [ bib ] |
[19] | Frank Vater, Peter Langendoerfer, and Steffen Peter. Combinatorial logic circuitry as means to protect low cost devices against side channel attacks. In Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems, pages 244-253. Springer, 2007. [ bib ] |
[20] | Frank Vater, Steffen Peter, and Peter Langendoerfer. An on-chip security monitoring solution for system clock for low cost devices. In 3rd Workshop on Embedded Systems Security (WESS'2008) - A Workshop of the IEEE/ACM EMSOFT'2008 and the Embedded Systems Week, 2008. [ bib ] |
[21] | Peter Langendoerfer, Steffen Peter, Krzysztof Piotrowski, R Nunes., and A. Casaca. A Middleware Approach to Configure Security in WSN. In 1st ERCIM Workshop on eMobility, 2007. [ bib ] |
[22] | Steffen Peter, Krzysztof Piotrowski, and Peter. Langendoerfer. In-network-aggregation as case study for a support tool reducing the complexity of designing secure wireless sensor networks. In Proc. of the Third IEEE International Workshop on Practical Issues in Building Sensor Network Applications (SenseApp), 2008. [ bib ] |
[23] | Steffen Peter, Mario Zessack, Frank Vater, Goran Panic, Horst Frankenfeldt, and Michael Methfessel. An encryption-enabled network protocol accelerator. In Proceedings of the 6th international conference on Wired/wireless internet communications, pages 79-91, 2008. [ bib ] |
[24] | Krzysztof Piotrowski, Peter Langendoerfer, and Steffen Peter. tinyDSM: A highly reliable cooperative data storage for Wireless Sensor Networks. In Collaborative Technologies and Systems, 2009. CTS'09. International Symposium on, pages 225-232, 2009. [ bib ] |
[25] | Steffen Peter, Oliver Stecklina, and Peter Langendoerfer. An engineering approach for secure and safe wireless sensor and actuator networks for industrial automation systems. In Emerging Technologies & Factory Automation, 2009. ETFA 2009. IEEE Conference on, pages 1-8, 2009. [ bib ] |
[26] | Steffen Peter, Oliver Stecklina, Jorge Portilla, Eduardo de la Torre, Peter Langendoerfer, and Teresa Riesgo. Reconfiguring crypto hardware accelerators on wireless sensor nodes. In Sensor, Mesh and Ad Hoc Communications and Networks Workshops, 2009. SECON Workshops' 09. 6th Annual IEEE Communications Society Conference on, pages 1-3, 2009. [ bib ] |
[27] | Jana Krimmling, Matthias Mahlig, and Steffen Peter. Test of a Bluetooth Transmission Path for Process Automation - Test einer Bluetooth-Funkstrecke für die Prozessautomatisierung. In SPS/IPC/Drives 2010, Nuremberg, 2010. [ bib ] |
[28] | Oliver Maye and Steffen Peter. How key establishment in medical sensor networks benefits from near field communication technology. In Green Computing and Communications (GreenCom), 2010 IEEE/ACM Int'l Conference on & Int'l Conference on Cyber, Physical and Social Computing (CPSCom), pages 566-571, 2010. [ bib ] |
[29] | Felix J. Oppermann and Steffen Peter. Inferring technical constraints of a wireless sensor network application from end-user requirements. In 2010 Sixth International Conference on Mobile Ad-hoc and Sensor Networks, pages 169-175, 2010. [ bib ] |
[30] | Thomas Basmer, Henry Schomann, and Steffen Peter. Implementation analysis of the ieee 802.15. 4 mac for wireless sensor networks. In Mobile and Wireless Networking (iCOST), 2011 International Conference on Selected Topics in, pages 7-12. IEEE, 2011. [ bib ] |
[31] | Goran Panic, Thomas Basmer, Oliver Schrape, Steffen Peter, Frank Vater, and Klaus Tittelbach-Helmrich. Sensor node processor for security applications. In Electronics, Circuits and Systems (ICECS), 2011 18th IEEE International Conference on, pages 81-84, 2011. [ bib ] |
[32] | Michael Methfessel, Steffen Peter, and Stefan Lange. Bluetooth scatternet tree formation for wireless sensor networks. In Mobile Adhoc and Sensor Systems (MASS), 2011 IEEE 8th International Conference on, pages 789-794, 2011. [ bib ] |
[33] | Zoya Dyka, Peter Langendoerfer, Frank Vater, and Steffen Peter. Towards strong security in embedded and pervasive systems: Energy and area optimized serial polynomial multipliers in gf (2k). In New Technologies, Mobility and Security (NTMS), 2012 5th International Conference on, pages 1-6, 2012. [ bib ] |
[34] | Goran Panic, Thomas Basmer, Henry Schomann, Steffen Peter, Frank Vater, and Klaus Tittelbach-Helmrich. Design of a sensor node crypto processor for ieee 802.15. 4 applications. In SOC Conference (SOCC), 2012 IEEE International, pages 213-217, 2012. [ bib ] |
[35] | Steffen Peter and Peter Langendoerfer. Tool-supported methodology for component-based design of wireless sensor network applicationss. In The 4th IEEE International Workshop on Component-Based Design of Resource-Constrained Systems, in conjunction with COMPSAC 2012 - the IEEE Signature Conference on Computers, Software, and Applications, 2012. [ bib ] |
[36] | Steffen Peter, Frank Vahid, Daniel D. Gajski, and Tony Givargis. A ball goes to school - our experiences from a cps design experiment. In First NSF Workshop on CPS Education (at CPSWeek 2013), 2013. [ bib ] |
[37] | Krzysztof Piotrowski and Steffen Peter. Sens4u: Wireless sensor network applications for environment monitoring made easy. In Fourth International Workshop on Software Engineering for Sensor Network Applications (SESENA) In conjunction with ACM/IEEE International Conference on Software Engineering (ICSE), 2013. [ bib ] |
[38] | Michael Methfessel, Stefan Lange, Rolf Kraemer, Mario Zessack, Peter Kollermann, and Steffen Peter. Real-life deployment of bluetooth scatternets for wireless sensor networks. In Fifth Workshop on Real-World Wireless Sensor Networks (RealWSN), 2013. [ bib ] |
[39] | Volkan Gunes, Steffen Peter, and Tony Givargis. Modeling and mitigation of faults in cyber-physical systems with binary sensors. In 13th IEEE International Conference on Computer and Information Technology (CIT), 2013. [ bib ] |
[40] | Steffen Peter and Tony Givargis. Utilizing intervals in component-based design of cyber physical systems. In 10th IEEE International Conference on Embedded Software and Systems (ICESS), 2013. [ bib ] |
[41] | Michael Methfessel, Stefan Lange, Rolf Kraemer, Mario Zessack, and Steffen Peter. Self-organized bluetooth scatternets for wireless sensor networks. In 11th ACM Conference on Embedded Networked Sensor Systems (SenSys), 2013. [ bib ] |
[42] | Xin Fan, Steffen Peter, and Milos Krstic. From old ideas to new questions - exploring gals design for sca resistance. In IEEE Symposium on Asynchronous Circuits and Systems (ASYNC 2014), 2014. [ bib ] |
[43] | Tom Springer, Steffen Peter, and Tony Givargis. Resource synchronization in hierarchically scheduled real-time systems using preemptive critical sections. In Object/Component/Service-Oriented Real-Time Distributed Computing (ISORC), 2014 IEEE 17th International Symposium on, 2014. [ bib ] |
[44] | Xin Fan, Steffen Peter, and Milos Krstic. Gals design of ecc against side-channel attacks - a comparative study. In Power and Timing Modeling, Optimization and Simulation (PATMOS), 2014. [ bib ] |
[45] | Jana Krimmling and Steffen Peter. Integration and evaluation of intrusion detection for coap in smart city applications. In Communications and Network Security (CNS), 2014 IEEE Conference on, 2014. [ bib ] |
[46] | Hamid Mirzaei, Steffen Peter, and Tony Givargis. Including variability of physical models into the design automation of cyber-physical systems. In 52nd Design Automation Conference (DAC), June 2015, 2015. [ bib ] |
[47] | Volkan Gunes, Steffen Peter, and Tony Givargis. Improving energy efficiency and thermal comfort of smart buildings with hvac systems in the presence of sensor faults. In to appear in 12th IEEE International Conference on Embedded Software and Systems (ICESS), August 2015, 2015. [ bib ] |
[48] | Tom Springer, Steffen Peter, and Tony Givargis. Fuzzy logic based adaptive hierarchical scheduling for periodic real-time tasks. In to appear in The 5th Embedded Operating Systems Workshop (EWiLi), organized as part of Embedded Systems Week (ESWeek), October 2015, 2015. [ bib ] |
[49] | Steffen Peter, Farshad Momtaz, and Tony Givargis. From the browser to the remote physical lab: Programming cyber-physical systems. In to appear in IEEE Frontiers in Education (FIE) 2015, October 21-24, EL Paso Texas, 2015. [ bib ] |
[50] | Steffen Peter. Tool-Supported Development of Secure Wireless Sensor Networks. PhD thesis, BTU Cottbus, 2011. [ bib ] |
[51] | Steffen Peter. Tool-supported composition of software modules for safe and secure wireless sensor networks. Invited Talk: TrustSoft Graduate School on Trustworthy Software Systems; Carl von Ossietzky Universitat Oldenburg, June 2009, 6 2009. [ bib ] |
[52] | Steffen Peter. Evaluation of design alternatives for flexible elliptic curve hardware accelerators, 2006. [ bib ] |
[53] | Steffen Peter and Gerd Weber. Monitoring drinking water pipelines - wsan demonstrator in frankfurt/oder, 2011. [ bib ] |
This file was generated by bibtex2html 1.95.