@patent{patent2006poly, nationality = {EP}, number = {EP Patent 1,859,344; WO Patent WO/2006/092,448}, author = {Peter Langendoerfer and Zoya Dyka and Steffen Peter}, title = {Method and device for calculating a polynom multiplication, in particular for elliptical curve cryptography}, mylink = {http://www.google.com/patents/WO2006092448A2} }
@patent{patent2007us, nationality = {US}, number = {EP Patent 1,999,571, US Patent 20100061547, WO Patent WO2007107592A2}, year = {2007}, author = {Peter Langendoerfer and Steffen Peter}, title = {Method and device for reducing a polynomial in a binary finite field, in particular for a cryptographic application}, mylink = {http://www.google.com/patents/WO2007107592A2} }
@patent{patent2008peter, number = {EP Patent 2118739, US Patent 20100095133, WO Patent 2008096004}, year = {2008}, author = {Steffen Peter and Michael Methfessel and Peter Langendoerfer and Frank Vater}, title = {REDUCTION OF SIDE CHANNEL INFORMATION BY INTERACTING CRYPTO BLOCKS}, mylink = {http://www.google.com/patents/WO2008096004A1} }
@patent{patent2009vater, nationality = {DE}, number = {DE Patent 102,007,031,131}, year = {2009}, author = {Frank Vater and Ulrich Jagdhold and Steffen Peter and Langend{oe}rfer, Peter}, title = {Takt{\"u}berwachungsschaltung mit interner Referenztaktquelle}, language = {german}, mylink = {http://worldwide.espacenet.com/publicationDetails/biblio?CC=DE&NR=102007031131A1} }
@patent{methfessel2009einchipsystem, author = {Michael Methfessel and Steffen Peter and Mario Zessack}, title = {Einchipsystem}, year = {2009}, number = {DE Patent 102,007,037,064}, mylink = {http://www.freepatentsonline.com/DE102007037064B4.html} }
@patent{patent2012bluetooth, nationality = {EP}, number = {EP Patent 2582182}, author = {Michael Methfessel and Steffen Peter}, title = {Bluetooth scatternet tree formation for wireless sensor networks}, mylink = {http://www.google.com/patents/EP2582182A1} }
@article{langend2007crosslayer, author = {Peter Langendoerfer and Krzysztof Piotrowski and Steffen Peter and Martin Lehmann}, title = {Crosslayer firewall interaction as a means to provide effective and efficient protection at mobile devices}, journal = {Computer Communications}, year = {2007}, volume = {30}, pages = {1487--1497}, number = {7}, address = {Newton, MA, USA}, issn = {0140-3664}, publisher = {Butterworth-Heinemann}, mydoc = {langendoerfer2007crosslayer.pdf} }
@article{langend2008privacy, author = {Peter Langendoerfer and Michael Maaser and Krzysztof Piotrowski and Steffen Peter}, title = {Privacy-Enhancing Technique: A Survey and Classification}, journal = {Handbook of Research on Wireless Security}, year = {2008}, pages = {115-128}, mydoc = {langendoerfer2008privacy.pdf} }
@article{peter2008ijsn, author = {Steffen Peter and Peter Langendoerfer and Krzysztof Piotrowski}, title = {Public key cryptography empowered smart dust is affordable}, journal = {International Journal of Sensor Networks}, year = {2008}, volume = {4}, number = {1/2}, mydoc = {IJSNET_peter.pdf} }
@article{portilla2010adaptable, author = {Jorge Portilla and A. Otero and Eduardo de la Torre and Teresa Riesgo and Oliver Stecklina and Seffen Peter and Peter Langend{oe}rfer}, title = {Adaptable security in wireless sensor networks by using reconfigurable ECC hardware coprocessors}, journal = {International Journal of Distributed Sensor Networks}, year = {2010}, volume = {2010}, publisher = {Hindawi Publishing Corporation}, mydoc = {portilla2010adaptable.pdf} }
@article{peter2010survey, author = {Steffen Peter and Dirk Westhoff and Claude Castelluccia}, title = {A survey on the encryption of convergecast traffic with in-network processing}, journal = {IEEE Transactions on Dependable and Secure Computing}, year = {2010}, pages = {20--34}, mydoc = {TDSC_peter.pdf} }
@article{springer2014arap, title = {Adaptive Resource Synchronization In Hierarchical Real-Time Systems}, author = {Tom Springer and Steffen Peter and Tony Givargis}, journal = {ACM SIGBED Review}, year = {2014}, month = {December}, number = {4}, volume = {11}, comment = {Special Issue on 4th Workshop on Adaptive and Reconfigurable Embedded Systems (EWiLi 2014)}, mydoc = {springer2014arap.pdf} }
@article{gunes2014survey, author = {Volkan Gunes and Steffen Peter and Tony Givargis and Frank Vahid}, title = {A Survey on Concepts, Applications, and Challenges in Cyber-Physical Systems}, journal = {KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS}, year = {2014}, pages = {4242--4268}, volume = {8}, number = {12}, mydoc = {CPS-SURVEY-KSII-11-03-2014.pdf} }
@article{peter2015sat, author = {Steffen Peter and Tony Givargis}, author = {Peter, Steffen and Givargis, Tony}, title = {Component-Based Synthesis of Embedded Systems Using Satisfiability Modulo Theories}, journal = {ACM Transactions on Design Automation of Electronic Systems (TODAES)}, issue_date = {September 2015}, volume = {20}, number = {4}, month = sep, year = {2015}, issn = {1084-4309}, pages = {49:1--49:27}, articleno = {49}, numpages = {27}, url = {http://doi.acm.org/10.1145/2746235}, doi = {10.1145/2746235}, publisher = {ACM}, mydoc = {peter2015sat.pdf} }
@inproceedings{piotrowski06sasn, author = {Krzysztof Piotrowski and Peter Langendoerfer and Steffen Peter}, title = {How public key cryptography influences wireless sensor node lifetime}, booktitle = {SASN '06: Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks}, year = {2006}, pages = {169--176}, mydoc = {SASN_piotrowski.pdf}, myslides = {SASN_piotrowski.ppt} }
@inproceedings{peter2007concealed, author = {Steffen Peter and Krzysztof Piotrowski and Peter Langendoerfer}, title = {On concealed data aggregation for WSNs}, booktitle = {IEEE Consumer Communications and Networking Conference (CCNC)}, year = {2007}, pages = {192--196}, mydoc = {CCNC_peter.pdf}, myslides = {CCNC_peter.ppt} }
@inproceedings{peter2007mul, author = {Steffen Peter and Peter Langendoerfer}, title = {An Efficient Polynomial Multiplier in GF(2m) and its Application to ECC Designs}, booktitle = {DATE '07: Proceedings of the conference on Design, automation and test in Europe}, year = {2007}, pages = {1253--1258}, address = {San Jose, CA, USA}, publisher = {EDA Consortium}, isbn = {978-3-9810801-2-4}, location = {Nice, France}, mydoc = {DATE_peter_polymul.pdf}, myslides = {DATE_peter_polymul.ppt} }
@inproceedings{peter2007reduction, author = {Steffen Peter and Peter Langendoerfer and Krzysztof Piotrowski}, title = {Flexible hardware reduction for elliptic curve cryptography in GF(2m)}, booktitle = {DATE '07: Proceedings of the conference on Design, automation and test in Europe}, year = {2007}, pages = {1259--1264}, address = {San Jose, CA, USA}, publisher = {EDA Consortium}, isbn = {978-3-9810801-2-4}, location = {Nice, France}, mydoc = {DATE_peter_reduc.pdf}, myslides = {DATE_peter_reduc.ppt} }
@inproceedings{vater2007wistp, author = {Frank Vater and Peter Langendoerfer and Steffen Peter}, title = {Combinatorial logic circuitry as means to protect low cost devices against side channel attacks}, booktitle = {Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems}, year = {2007}, pages = {244-253}, publisher = {Springer}, mydoc = {WISTP_vater.pdf}, myslides = {WISTP_vater_slides.pdf} }
@inproceedings{vater2008wess, author = {Frank Vater and Steffen Peter and Peter Langendoerfer}, title = {An On-chip Security Monitoring Solution For System Clock For Low Cost Devices}, booktitle = {3rd Workshop on Embedded Systems Security (WESS'2008) - A Workshop of the IEEE/ACM EMSOFT'2008 and the Embedded Systems Week}, year = {2008}, mydoc = {WESS_vater.pdf} }
@inproceedings{langendoerfer2008middleware, author = {Peter Langendoerfer and Steffen Peter and Krzysztof Piotrowski and R Nunes. and A. Casaca}, title = {{A Middleware Approach to Configure Security in WSN}}, booktitle = {1st ERCIM Workshop on eMobility}, year = {2007}, mydoc = {ERCIM_langendoerfer.pdf}, myslides = {ERCIM_langendoerfer.ppt} }
@inproceedings{peter2008ina, author = {Steffen Peter and Krzysztof Piotrowski and Peter. Langendoerfer}, title = {In-Network-Aggregation as Case Study for a Support Tool Reducing the Complexity of Designing Secure Wireless Sensor Networks}, booktitle = {Proc. of the Third {IEEE} International Workshop on Practical Issues in Building Sensor Network Applications ({SenseApp})}, year = {2008}, mydoc = {SENSEAPP_peter.pdf} }
@inproceedings{peter2008processor, author = {Steffen Peter and Mario Zessack and Frank Vater and Goran Panic and Horst Frankenfeldt and Michael Methfessel}, title = {{An encryption-enabled network protocol accelerator}}, booktitle = {Proceedings of the 6th international conference on Wired/wireless internet communications}, year = {2008}, pages = {79--91}, mydoc = {WWIC_peter.pdf}, myslides = {WWIC_peter.ppt} }
@inproceedings{piotrowski2009tinydsm, author = {Krzysztof Piotrowski and Peter Langendoerfer and Steffen Peter}, title = {{tinyDSM: A highly reliable cooperative data storage for Wireless Sensor Networks}}, booktitle = {Collaborative Technologies and Systems, 2009. CTS'09. International Symposium on}, year = {2009}, pages = {225--232}, mydoc = {DCSN_piotrowski.pdf}, myslides = {DCSN_piotrowski.ppt} }
@inproceedings{peter2009etfa, author = {Steffen Peter and Oliver Stecklina and Peter Langendoerfer}, title = {{An engineering approach for secure and safe wireless sensor and actuator networks for industrial automation systems}}, booktitle = {Emerging Technologies \& Factory Automation, 2009. ETFA 2009. IEEE Conference on}, year = {2009}, pages = {1--8}, mydoc = {EFTA_peter.pdf}, myslides = {ETFA_peter.ppt} }
@inproceedings{peter2009reconfiguring, author = {Steffen Peter and Oliver Stecklina and Jorge Portilla and Eduardo de la Torre and Peter Langendoerfer and Teresa Riesgo}, title = {Reconfiguring crypto hardware accelerators on wireless sensor nodes}, booktitle = {Sensor, Mesh and Ad Hoc Communications and Networks Workshops, 2009. SECON Workshops' 09. 6th Annual IEEE Communications Society Conference on}, year = {2009}, pages = {1--3}, mydoc = {DEMO_confcrypt.pdf} }
@inproceedings{krimmling2010, author = {Jana Krimmling and Matthias Mahlig and Steffen Peter}, title = {{Test of a Bluetooth Transmission Path for Process Automation - Test einer Bluetooth-Funkstrecke f{\"u}r die Prozessautomatisierung}}, booktitle = {SPS/IPC/Drives 2010, Nuremberg}, year = {2010}, mydoc = {SPS_krimmling.pdf}, myslides = {SPS_krimmling_slides.pdf} }
@inproceedings{maye2010key, author = {Oliver Maye and Steffen Peter}, title = {How key establishment in medical sensor networks benefits from near field communication technology}, booktitle = {Green Computing and Communications (GreenCom), 2010 IEEE/ACM Int'l Conference on \& Int'l Conference on Cyber, Physical and Social Computing (CPSCom)}, year = {2010}, pages = {566--571}, mydoc = {IOTS_maye.pdf} }
@inproceedings{oppermann2010inferring, author = {Felix J. Oppermann and Steffen Peter}, title = {Inferring Technical Constraints of a Wireless Sensor Network Application from End-User Requirements}, booktitle = {2010 Sixth International Conference on Mobile Ad-hoc and Sensor Networks}, year = {2010}, pages = {169--175}, mydoc = {MSN2010_peter.pdf} }
@inproceedings{basmer2011implementation, author = {Thomas Basmer and Henry Schomann and Steffen Peter}, title = {Implementation analysis of the IEEE 802.15. 4 MAC for wireless sensor networks}, booktitle = {Mobile and Wireless Networking (iCOST), 2011 International Conference on Selected Topics in}, year = {2011}, pages = {7--12}, organization = {IEEE}, mydoc = {Basmer2011ImplementationAnalysis.pdf} }
@inproceedings{panic2011sensor, author = {Goran Panic and Thomas Basmer and Oliver Schrape and Steffen Peter and Frank Vater and Klaus Tittelbach-Helmrich}, title = {Sensor node processor for security applications}, booktitle = {Electronics, Circuits and Systems (ICECS), 2011 18th IEEE International Conference on}, year = {2011}, pages = {81--84}, mydoc = {GPanic-ICECS2011_final.pdf} }
@inproceedings{methfessel2011bluetooth, author = {Michael Methfessel and Steffen Peter and Stefan Lange}, title = {Bluetooth Scatternet Tree Formation for Wireless Sensor Networks}, booktitle = {Mobile Adhoc and Sensor Systems (MASS), 2011 IEEE 8th International Conference on}, year = {2011}, pages = {789--794}, mydoc = {Methfessel2011Bluetooth.pdf} }
@inproceedings{dyka2012towards, author = {Zoya Dyka and Peter Langendoerfer and Frank Vater and Steffen Peter}, title = {Towards Strong Security in Embedded and Pervasive Systems: Energy and Area Optimized Serial Polynomial Multipliers in GF (2k)}, booktitle = {New Technologies, Mobility and Security (NTMS), 2012 5th International Conference on}, year = {2012}, pages = {1--6}, mydoc = {dyka2012towards.pdf} }
@inproceedings{panic2012design, author = {Goran Panic and Thomas Basmer and Henry Schomann and Steffen Peter and Frank Vater and Klaus Tittelbach-Helmrich}, title = {Design of a sensor node crypto processor for IEEE 802.15. 4 applications}, booktitle = {SOC Conference (SOCC), 2012 IEEE International}, year = {2012}, pages = {213--217}, mydoc = {panic2012design.pdf} }
@inproceedings{peter2012tool, author = {Steffen Peter and Peter Langendoerfer}, title = {Tool-supported Methodology for Component-based Design of Wireless Sensor Network Applicationss}, booktitle = {The 4th IEEE International Workshop on Component-Based Design of Resource-Constrained Systems, in conjunction with COMPSAC 2012 - the IEEE Signature Conference on Computers, Software, and Applications}, year = {2012}, mydoc = {peter-Methodology-CORCS2012.pdf}, myslides = {peter-Methodology-CORCS2012.pptx} }
@inproceedings{peter2013edu, author = {Steffen Peter and Frank Vahid and Daniel D. Gajski and Tony Givargis}, title = {A Ball Goes to School - Our Experiences from a CPS Design Experiment}, booktitle = {First NSF Workshop on CPS Education (at CPSWeek 2013)}, year = {2013}, mydoc = {peter2013edu.pdf}, myposter = {ball_poster.pdf}, myslides = {ball_presi.pptx} }
@inproceedings{piotrowski2013sens4u, author = {Krzysztof Piotrowski and Steffen Peter}, title = {Sens4U: Wireless Sensor Network Applications for Environment Monitoring Made Easy}, booktitle = {Fourth International Workshop on Software Engineering for Sensor Network Applications (SESENA) In conjunction with ACM/IEEE International Conference on Software Engineering (ICSE)}, year = {2013}, mydoc = {piotrowski2013sesena.pdf}, myslides = {sesena2013-sens4u.pptx} }
@inproceedings{methfessel2013bluetooth, author = {Michael Methfessel and Stefan Lange and Rolf Kraemer and Mario Zessack and Peter Kollermann and Steffen Peter}, title = {Real-Life Deployment of Bluetooth Scatternets for Wireless Sensor Networks}, booktitle = {Fifth Workshop on Real-World Wireless Sensor Networks (RealWSN)}, year = {2013}, mydoc = {methfessel2013bluetooth.pdf} }
@inproceedings{gunes2013modeling, author = {Volkan Gunes and Steffen Peter and Tony Givargis}, title = {Modeling and Mitigation of Faults in Cyber-Physical Systems with Binary Sensors}, booktitle = {13th IEEE International Conference on Computer and Information Technology (CIT)}, year = {2013}, mydoc = {gunes2013modeling.pdf} }
@inproceedings{peter2013intervals, author = {Steffen Peter and Tony Givargis}, title = {Utilizing Intervals in Component-based Design of Cyber Physical Systems}, booktitle = {10th IEEE International Conference on Embedded Software and Systems (ICESS)}, year = {2013}, mydoc = {peter2013intervals.pdf} }
@inproceedings{methfessel2013sensys, author = {Michael Methfessel and Stefan Lange and Rolf Kraemer and Mario Zessack and Steffen Peter}, title = {Self-Organized Bluetooth Scatternets for Wireless Sensor Networks}, booktitle = {11th ACM Conference on Embedded Networked Sensor Systems (SenSys)}, year = {2013} }
@inproceedings{xinfan2014sca, author = {Xin Fan and Steffen Peter and Milos Krstic}, title = {From Old Ideas to New Questions - Exploring GALS Design for SCA Resistance}, booktitle = {IEEE Symposium on Asynchronous Circuits and Systems (ASYNC 2014)}, year = {2014} }
@inproceedings{springer2014seus, title = {Resource Synchronization in Hierarchically Scheduled Real-Time Systems using Preemptive Critical Sections}, author = {Springer, Tom and Peter, Steffen and Givargis, Tony}, booktitle = {Object/Component/Service-Oriented Real-Time Distributed Computing (ISORC), 2014 IEEE 17th International Symposium on}, year = {2014}, mydoc = {springer2014seus.pdf} }
@inproceedings{xinfan2014patmos, author = {Xin Fan and Steffen Peter and Milos Krstic}, title = {GALS Design of ECC Against Side-Channel Attacks - A Comparative Study}, booktitle = {Power and Timing Modeling, Optimization and Simulation (PATMOS)}, year = {2014}, mydoc = {xinfan2014patmos.pdf} }
@inproceedings{krimmling2014ids_coap, author = {Jana Krimmling and Steffen Peter}, title = {Integration and Evaluation of Intrusion Detection for CoAP in Smart City Applications}, booktitle = {Communications and Network Security (CNS), 2014 IEEE Conference on}, year = {2014}, mydoc = {krimmling2014ids_coap.pdf} }
@inproceedings{hamid2015variabilty, author = {Hamid Mirzaei and Steffen Peter and Tony Givargis}, title = {Including Variability of Physical Models into the Design Automation of Cyber-Physical Systems}, booktitle = {52nd Design Automation Conference (DAC), June 2015}, year = {2015}, mydoc = {hamid2015variability.pdf} }
@inproceedings{gunes2015hvac, author = {Volkan Gunes and Steffen Peter and Tony Givargis}, title = {Improving Energy Efficiency and Thermal Comfort of Smart Buildings with HVAC Systems in the Presence of Sensor Faults}, booktitle = {to appear in 12th IEEE International Conference on Embedded Software and Systems (ICESS), August 2015}, year = {2015}, mydoc = {gunes2015hvac.pdf} }
@inproceedings{springer2015ewili, title = {Fuzzy Logic Based Adaptive Hierarchical Scheduling for Periodic Real-Time Tasks}, author = {Springer, Tom and Peter, Steffen and Givargis, Tony}, booktitle = {to appear in The 5th Embedded Operating Systems Workshop (EWiLi), organized as part of Embedded Systems Week (ESWeek), October 2015}, year = {2015}, mydoc = {springer2015ewili.pdf} }
@inproceedings{peter2015education, author = {Steffen Peter and Farshad Momtaz and Tony Givargis}, title = {From the Browser to the Remote Physical Lab: Programming Cyber-physical Systems}, booktitle = {to appear in IEEE Frontiers in Education (FIE) 2015, October 21-24, EL Paso Texas}, year = {2015}, mydoc = {peter2015education.pdf} }
@phdthesis{peter2011diss, author = {Steffen Peter}, title = {Tool-Supported Development of Secure Wireless Sensor Networks}, school = {BTU Cottbus}, year = {2011}, mydoc = {diss_peter.pdf} }
@misc{peter2010oldenburg, author = {Steffen Peter}, title = {Tool-supported Composition of Software Modules for Safe and Secure Wireless Sensor Networks}, howpublished = {Invited Talk: TrustSoft Graduate School on Trustworthy Software Systems; Carl von Ossietzky Universitat Oldenburg, June 2009}, month = {6}, year = {2009}, myslides = {INVTALK_trustsoft.pdf} }
@masterthesis{peter2006thesis, author = {Steffen Peter}, title = {Evaluation of Design Alternatives for flexible Elliptic Curve Hardware Accelerators}, school = {Brandenburgische Technische Universitaet Cottbus}, year = {2006}, mydoc = {da_peter.pdf} }
@misc{peter2011monitoring, author = {Steffen Peter and Gerd Weber}, title = {Monitoring drinking water pipelines - WSAN demonstrator in Frankfurt/Oder}, journal = {Eurescom mess@ge}, year = {2011}, volume = {1}, mylink = {http://www.eurescom.eu/?id=135} }
This file was generated by bibtex2html 1.95.