Peter Langendörfer

Orcid: 0000-0002-6209-9048

Affiliations:
  • Technischen Universität Cottbus, Germany
  • IHP GmbH - Leibniz Institute for Innovations for High Performance Microelectronics (former)


According to our database1, Peter Langendörfer authored at least 211 papers between 1996 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Non-Profiled Unsupervised Horizontal Iterative Attack against Hardware Elliptic Curve Scalar Multiplication Using Machine Learning.
Future Internet, February, 2024

Investigating the Security of OpenPLC: Vulnerabilities, Attacks, and Mitigation Solutions.
IEEE Access, 2024

2023
Through the Window: Exploitation and Countermeasures of the ESP32 Register Window Overflow.
Future Internet, June, 2023

Finding gadgets in incremental code updates for return-oriented programming attacks on resource-constrained devices.
Ann. des Télécommunications, April, 2023

Window Canaries: Re-Thinking Stack Canaries for Architectures With Register Windows.
IEEE Trans. Dependable Secur. Comput., 2023

On the Stability and Homogeneous Ensemble of Feature Selection for Predictive Maintenance: A Classification Application for Tool Condition Monitoring in Milling.
Sensors, 2023

Intelligence and Motion Models of Continuum Robots: An Overview.
IEEE Access, 2023

You Are What You Attack: Breaking the Cryptographically Protected S7 Protocol.
Proceedings of the 19th IEEE International Conference on Factory Communication Systems, 2023

Successful Simple Side Channel Analysis: Vulnerability of an atomic pattern $kP$ algorithm implemented with a constant time crypto library to simple electromagnetic analysis attacks.
Proceedings of the 12th Mediterranean Conference on Embedded Computing, 2023

GPS-Spoofing Attack Detection Mechanism for UAV Swarms.
Proceedings of the 12th Mediterranean Conference on Embedded Computing, 2023

Coarse-grained Control Flow Integrity Check for Processors with Sliding Register Windows.
Proceedings of the 12th Mediterranean Conference on Embedded Computing, 2023

Novel Approach to a Plant Inspired Distributed Security Scheme for Wireless Sensor Networks.
Proceedings of the 12th Mediterranean Conference on Embedded Computing, 2023

Good Night, and Good Luck: A Control Logic Injection Attack on OpenPLC.
Proceedings of the 49th Annual Conference of the IEEE Industrial Electronics Society, 2023

On the Influence of the Laser Illumination on the Logic Cells Current Consumption : First measurement results.
Proceedings of the 30th IEEE International Conference on Electronics, Circuits and Systems, 2023

No Attacks Are Available: Securing the OpenPLC and Related Systems.
Proceedings of the 53. Jahrestagung der Gesellschaft für Informatik, INFORMATIK 2023, Designing Future, 2023

Vulnerability of Atomic Patterns to Simple SCA.
Proceedings of the IEEE East-West Design & Test Symposium, 2023

Non-Profiled Semi-Supervised Horizontal Attack Against Elliptic Curve Scalar Multiplication Using Support Vector Machines.
Proceedings of the 26th Euromicro Conference on Digital System Design, 2023

Randomized Addressing Countermeasures are Inefficient Against Address-Bit SCA.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

Machine Learning based Real Time Detection of Freezing of Gait of Parkinson Patients Running on a Body Worn Device.
Proceedings of the IEEE/ACM Conference on Connected Health: Applications, 2023

A Stealthy False Command Injection Attack on Modbus based SCADA Systems.
Proceedings of the 20th IEEE Consumer Communications & Networking Conference, 2023

2022
Atomicity and Regularity Principles Do Not Ensure Full Resistance of ECC Designs against Single-Trace Attacks.
Sensors, 2022

Kafka-ML: Connecting the data stream with ML/AI frameworks.
Future Gener. Comput. Syst., 2022

Determining Distributions of Security Means for Wireless Sensor Networks based on the Model of a Neighbourhood Watch.
CoRR, 2022

On the Complexity of Attacking Elliptic Curve Based Authentication Chips.
CoRR, 2022

UNITE: Integrated IoT-Edge-Cloud Continuum.
Proceedings of the 8th IEEE World Forum on Internet of Things, 2022

Return-Oriented Programming Gadget Catalog for the Xtensa Architecture.
Proceedings of the 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2022

Code Mutation as a mean against ROP Attacks for Embedded Systems.
Proceedings of the 11th Mediterranean Conference on Embedded Computing, 2022

Distributed Artificial Intelligence as a Means to Achieve Self-X-Functions for Increasing Resilience: the First Steps.
Proceedings of the 11th Mediterranean Conference on Embedded Computing, 2022

Scalable FPGA Hardware Accelerator for SVM Inference.
Proceedings of the 11th Mediterranean Conference on Embedded Computing, 2022

On the SCA Resistance of Crypto IP Cores.
Proceedings of the 23rd IEEE Latin American Test Symposium, 2022

Through the Window: On the exploitability of Xtensa's Register Window Overflow.
Proceedings of the 32nd International Telecommunication Networks and Applications Conference, 2022

No Need to be Online to Attack - Exploiting S7-1500 PLCs by Time-Of-Day Block.
Proceedings of the XXVIII International Conference on Information, 2022

Combination of ROP Defense Mechanisms for Better Safety and Security in Embedded Systems.
Proceedings of the 25th Euromicro Conference on Digital System Design, 2022

2021
Sensitivity of HfO<sub>2</sub>-based RRAM Cells to Laser Irradiation.
Microprocess. Microsystems, November, 2021

On the Complexity of Attacking Commercial Authentication Products.
Microprocess. Microsystems, 2021

Resilience in the Cyberworld: Definitions, Features and Models.
Future Internet, 2021

Resistance of the Montgomery Ladder Against Simple SCA: Theory and Practice.
J. Electron. Test., 2021

Optical Fault Injection Attacks against Radiation-Hard Registers.
CoRR, 2021

Resilience in the Cyber World: Definitions, Features and Models.
CoRR, 2021

Impact of Data Preparation in Freezing of Gait Detection Using Feature-Less Recurrent Neural Network.
IEEE Access, 2021

A TOPSIS-Assisted Feature Selection Scheme and SOM-Based Anomaly Detection for Milling Tools Under Different Operating Conditions.
IEEE Access, 2021

FFT based Horizontal SCA Attack against ECC.
Proceedings of the 11th IFIP International Conference on New Technologies, 2021

Octopuses: biological facts and technical solutions.
Proceedings of the 10th Mediterranean Conference on Embedded Computing, 2021

Jamming Detection for IR-UWB Ranging Technology in Autonomous UAV Swarms.
Proceedings of the 10th Mediterranean Conference on Embedded Computing, 2021

Multiplier as a Mean for Reducing Vulnerability of Atomic Patterns to Horizontal Address-Bit Attacks.
Proceedings of the 10th Mediterranean Conference on Embedded Computing, 2021

Clustering versus Statistical Analysis for SCA: when Machine Learning is Better.
Proceedings of the 10th Mediterranean Conference on Embedded Computing, 2021

EC Scalar Multiplication: Successful Simple Address-Bit SCA Attack against Atomic Patterns.
Proceedings of the 22nd IEEE Latin American Test Symposium, 2021

A Fully-Blind False Data Injection on PROFINET I/O Systems.
Proceedings of the 30th IEEE International Symposium on Industrial Electronics, 2021

Vibration Analysis of a Wind Turbine Gearbox for Off-cloud Health Monitoring through Neuromorphic-computing.
Proceedings of the IECON 2021, 2021

A Control Injection Attack against S7 PLCs -Manipulating the Decompiled Code.
Proceedings of the IECON 2021, 2021

Patch Now and Attack Later - Exploiting S7 PLCs by Time-Of-Day Block.
Proceedings of the 4th IEEE International Conference on Industrial Cyber-Physical Systems, 2021

A Stealth Program Injection Attack against S7-300 PLCs.
Proceedings of the 22nd IEEE International Conference on Industrial Technology, 2021

Simulation of Electromagnetic Emanation of Cryptographic ICs: Tools, Methods, Problems.
Proceedings of the IEEE East-West Design & Test Symposium, 2021

Optical Fault Injection Attacks against Radiation-Hard Shift Registers.
Proceedings of the 24th Euromicro Conference on Digital System Design, 2021

Fast Dual-Field ECDSA Accelerator with Increased Resistance against Horizontal SCA Attacks.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021

Incremental code updates exploitation as a basis for return oriented programming attacks on resource-constrained devices.
Proceedings of the 5th Cyber Security in Networking Conference, 2021

FPGA-Based Realtime Detection of Freezing of Gait of Parkinson Patients.
Proceedings of the Body Area Networks. Smart IoT and Big Data for Intelligent Health Management, 2021

2020
Demonstration of WISDOM - a Wireless in Field Measurement and Debugging Platform for Wireless Sensor Networks and Devices.
WiPiEC Journal, 2020

Methods increasing inherent resistance of ECC designs against horizontal attacks.
Integr., 2020

Kafka-ML: connecting the data stream with ML/AI frameworks.
CoRR, 2020

Bonded Wireless Networks: the Gateway to Real-Time Mobile Applications.
Proceedings of the 28th International Conference on Software, 2020

Sensitivity of Standard Library Cells to Optical Fault Injection Attacks in IHP 250 nm Technology.
Proceedings of the 9th Mediterranean Conference on Embedded Computing, 2020

Resilience Aspects in Distributed Wireless Electroencephalographic Sampling.
Proceedings of the 9th Mediterranean Conference on Embedded Computing, 2020

Artefacts in EEG Signals Epileptic Seizure Prediction using Edge Devices.
Proceedings of the 9th Mediterranean Conference on Embedded Computing, 2020

Automated Simple Analysis Attack.
Proceedings of the 9th Mediterranean Conference on Embedded Computing, 2020

No Resilience without Security.
Proceedings of the 9th Mediterranean Conference on Embedded Computing, 2020

Horizontal SCA Attacks against $kP$ Algorithm Using K-Means and PCA.
Proceedings of the 9th Mediterranean Conference on Embedded Computing, 2020

Resistance of the Montgomery kP Algorithm against Simple SCA: Theory and Practice.
Proceedings of the IEEE Latin-American Test Symposium, 2020

Metal Fillers as Potential Low Cost Countermeasure against Optical Fault Injection Attacks.
Proceedings of the IEEE East-West Design & Test Symposium, 2020

Exploiting EEG Signals for Eye Motion Tracking.
Proceedings of the IEEE East-West Design & Test Symposium, 2020

Integration and Implementation of four different Elliptic Curves in a single high-speed Design considering SCA.
Proceedings of the 15th Design & Technology of Integrated Systems in Nanoscale Era, 2020

Evaluation of the Sensitivity of RRAM Cells to Optical Fault Injection Attacks.
Proceedings of the 23rd Euromicro Conference on Digital System Design, 2020

Challenges of Return-Oriented-Programming on the Xtensa Hardware Architecture.
Proceedings of the 23rd Euromicro Conference on Digital System Design, 2020

Breaking a fully Balanced ASIC Coprocessor Implementing Complete Addition Formulas on Weierstrass Elliptic Curves.
Proceedings of the 23rd Euromicro Conference on Digital System Design, 2020

RESCUE: Interdependent Challenges of Reliability, Security and Quality in Nanoelectronic Systems.
Proceedings of the 2020 Design, Automation & Test in Europe Conference & Exhibition, 2020

2019
Real-world deployments of sensor networks: Practical lessons for researchers.
Comput. Commun., 2019

On the Influence of the FPGA Compiler Optimization Options on the Success of the Horizontal Attack.
Proceedings of the 2019 International Conference on ReConFigurable Computing and FPGAs, 2019

Intelligent Clustering as a Means to Improve K-means Based Horizontal Attacks.
Proceedings of the 30th IEEE International Symposium on Personal, 2019

On the Complexity of Attacking Commercial Authentication Products.
Proceedings of the 10th IFIP International Conference on New Technologies, 2019

Horizontal Attacks using K-Means: Comparison with Traditional Analysis Methods.
Proceedings of the 10th IFIP International Conference on New Technologies, 2019

Resilience more than the Sum of Security and Dependability: Cognition is what makes the Difference.
Proceedings of the 8th Mediterranean Conference on Embedded Computing, 2019

On the Impact of the Sampling Rate on the Success of Horizontal DEMA Attack.
Proceedings of the 31. Krypto-Tag, Berlin, Germany, October 17-18, 2019, 2019

Edge computing devices assessment for cryptography and biomedical signal analysis.
Proceedings of the 31. Krypto-Tag, Berlin, Germany, October 17-18, 2019, 2019

Using machine learning techniques for hardware performance counter classification and ROP attack detection.
Proceedings of the 31. Krypto-Tag, Berlin, Germany, October 17-18, 2019, 2019

ECC Based Secure Authentication Solutions.
Proceedings of the 30. Krypto-Tag, Berlin, Germany, March 28-29, 2019, 2019

Horizontal SCA Attack using Machine Learning Algorithms.
Proceedings of the 30. Krypto-Tag, Berlin, Germany, March 28-29, 2019, 2019

Evaluation of the ECDSA IHP Hardware Accelerator.
Proceedings of the 31. Krypto-Tag, Berlin, Germany, October 17-18, 2019, 2019

Fast and Secure Unified Field Multiplier for ECC Based on the 4-Segment Karatsuba Multiplication.
Proceedings of the 2019 IEEE East-West Design & Test Symposium, 2019

Researching Resilience a Holistic Approach.
Proceedings of the 2019 IEEE East-West Design & Test Symposium, 2019

Caution: GALS-ification as a Means against SCA Attacks.
Proceedings of the 2019 IEEE East-West Design & Test Symposium, 2019

Horizontal Attacks Against ECC: From Simulations to ASIC.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019

Horizontal DPA Attacks against ECC: Impact of Implemented Field Multiplication Formula.
Proceedings of the 14th International Conference on Design & Technology of Integrated Systems In Nanoscale Era, 2019

2018
Horizontal DEMA Attack as the Criterion to Select the Best Suitable EM Probe.
IACR Cryptol. ePrint Arch., 2018

On Wireless Channel Parameters for Key Generation in Industrial Environments.
IEEE Access, 2018

FPGA Implementation of ECC: Low-Cost Countermeasure against Horizontal Bus and Address-Bit SCA.
Proceedings of the 2018 International Conference on ReConFigurable Computing and FPGAs, 2018

Flexible FPGA ECDSA Design with a Field Multiplier Inherently Resistant against HCCA.
Proceedings of the 2018 International Conference on ReConFigurable Computing and FPGAs, 2018

Horizontal Address-Bit DEMA against ECDSA.
Proceedings of the 9th IFIP International Conference on New Technologies, 2018

Placement of Gates in ECC Designs.
Proceedings of the 29. Krypto-Tag, Renningen, Germany, September 6-7, 2018, 2018

Optical Fault Injections: Most Often Used Setups.
Proceedings of the 29. Krypto-Tag, Renningen, Germany, September 6-7, 2018, 2018

HCCA against Montgomery kP Design.
Proceedings of the 29. Krypto-Tag, Renningen, Germany, September 6-7, 2018, 2018

Low-Cost Countermeasure against Horizontal Bus and Address-Bit SCA.
Proceedings of the 29. Krypto-Tag, Renningen, Germany, September 6-7, 2018, 2018

Comments On: Constant Time Modular Inversion.
Proceedings of the 29. Krypto-Tag, Renningen, Germany, September 6-7, 2018, 2018

Low-energy key exchange for automation systems.
Proceedings of the 13th International Conference on Design & Technology of Integrated Systems In Nanoscale Era, 2018

Unified field multiplier for ECC: Inherent resistance against horizontal SCA attacks.
Proceedings of the 13th International Conference on Design & Technology of Integrated Systems In Nanoscale Era, 2018

2017
Horizontal address-bit DPA against montgomery kP implementation.
Proceedings of the International Conference on ReConFigurable Computing and FPGAs, 2017

Shortening the security parameters in lightweight WSN applications for IoT - lessons learned.
Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops, 2017

Methods for Increasing the Resistance of Cryptographic Designs Against Horizontal DPA Attacks.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

Evaluation of resistance of ECC designs protected by different randomization countermeasures against horizontal DPA attacks.
Proceedings of the 2017 IEEE East-West Design & Test Symposium, 2017

2016
Detecting Elementary Arm Movements by Tracking Upper Limb Joint Angles With MARG Sensors.
IEEE J. Biomed. Health Informatics, 2016

Preparation of SCA Attacks: Successfully Decapsulating BGA Packages.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2016

Increasing the Robustness of the Montgomery kP-Algorithm Against SCA by Modifying Its Initialization.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2016

Comparison of EM Probes Using SEMA of an ECC Design.
Proceedings of the 8th IFIP International Conference on New Technologies, 2016

Inherent Resistance of Efficient ECC Designs against SCA Attacks.
Proceedings of the 8th IFIP International Conference on New Technologies, 2016

2015
Influence of Electrical Circuits of ECC Designs on Shape of Electromagnetic Traces measured on FPGA.
IACR Cryptol. ePrint Arch., 2015

Individualizing Electrical Circuits of Cryptographic Devices as a Means to Hinder Tampering Attacks.
IACR Cryptol. ePrint Arch., 2015

Intrinsic Code Attestation by Instruction Chaining for Embedded Devices.
Proceedings of the Security and Privacy in Communication Networks, 2015

SMARTIE project: Secure IoT data management for smart cities.
Proceedings of the International Conference on Recent Advances in Internet of Things, 2015

Clockwise Randomization of the Observable Behaviour of Crypto ASICs to Counter Side Channel Attacks.
Proceedings of the 2015 Euromicro Conference on Digital System Design, 2015

Bug-Tolerant Sensor Networks: Experiences from Real-World Applications.
Proceedings of the Ad Hoc Networks, 2015

2014
Enabling Wireless Sensor Nodes for Self-Contained Jamming Detection.
J. Cyber Secur. Mobil., 2014

Proposing Individualization of the design of cryptographic hardware accelerators as countermeasure against structure and side channel analysis.
IACR Cryptol. ePrint Arch., 2014

How Different Electrical Circuits of ECC Designs Influence the Shape of Power Traces measured on FPGA.
IACR Cryptol. ePrint Arch., 2014

Multi-channel support for preamble sampling MAC protocols in sensor networks.
Proceedings of the 22nd International Conference on Software, 2014

Telemedicine system for game-based rehabilitation of stroke patients in the FP7-"StrokeBack" project.
Proceedings of the European Conference on Networks and Communications, 2014

2013
A Lifetime Forecast Scheme for a Distributed Low Duty Cycle Multi-Hop Routing in Wireless Sensor Networks.
Int. J. Bus. Data Commun. Netw., 2013

Overview and benchmarks of pragmatic debugging techniques for wireless sensor networks.
Proceedings of the 21st International Conference on Software, 2013

Design of a tailor-made memory protection unit for low power microcontrollers.
Proceedings of the 8th IEEE International Symposium on Industrial Embedded Systems, 2013

A fair energy trade multi-hop routing in wireless sensor networks.
Proceedings of the 6th Joint IFIP Wireless and Mobile Networking Conference, 2013

Is cross-platform protocol stack suitable for sensor networks? Empirical evaluation.
Proceedings of the 6th Joint IFIP Wireless and Mobile Networking Conference, 2013

Improving the Security of Wireless Sensor Networks by Protecting the Sensor Nodes against Side Channel Attacks.
Proceedings of the Wireless Networks and Security, Issues, Challenges and Research Trends., 2013

2012
Support for a Long Lifetime and Short End-to-End Delays with TDMA Protocols in Sensor Networks.
Int. J. Distributed Sens. Networks, 2012

Distributed Shared Memory as an Approach for Integrating WSNs and Cloud Computing.
Proceedings of the 5th International Conference on New Technologies, 2012

Towards Strong Security in Embedded and Pervasive Systems: Energy and Area Optimized Serial Polynomial Multipliers in GF(2k).
Proceedings of the 5th International Conference on New Technologies, 2012

The all IHP sensor node: highly integrated sensor nodes using IHP components.
Proceedings of the 10th ACM International Symposium on Mobility Management and Wireless Access, 2012

Tool-Supported Methodology for Component-Based Design of Wireless Sensor Network Applications.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference Workshops, 2012

Side channel attacks and the non volatile memory of the future.
Proceedings of the 15th International Conference on Compilers, 2012

A Telemedicine System for Improved Rehabilitation of Stroke Patients.
Proceedings of the HEALTHINF 2012 - Proceedings of the International Conference on Health Informatics, Vilamoura, Algarve, Portugal, 1, 2012

2011
WiSec 2011 demo: demonstrating self-contained on-node counter measures for various jamming attacks in WSN.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2011

Emerging technologies and applications of wireless communication in healthcare.
J. Commun. Networks, 2011

Combining Multiplication Methods with Optimized Processing Sequence for Polynomial Multiplier in GF(2 k ).
Proceedings of the Research in Cryptology - 4th Western European Workshop, 2011

The Impact of Social Networks on user Privacy - What Social Networks Really Learn about Their Users!
Proceedings of the WEBIST 2011, 2011

Symbiosis of a Lightweight ECC Security and Distributed Shared Memory Middleware in Wireless Sensor Networks.
Proceedings of the 30th IEEE Symposium on Reliable Distributed Systems Workshops, 2011

Towards a Secure Address Space Separation for Low Power Sensor Nodes.
Proceedings of the PECCS 2011, 2011

Cross-platform protocol development for sensor networks: lessons learned.
Proceedings of the 2nd Workshop on Software Engineering for Sensor Network Applications, 2011

Ubiquitous computing asks for ubiquitous line of defense.
Proceedings of the 41. Jahrestagung der Gesellschaft für Informatik, 2011

2010
Application of wireless sensor networks in critical infrastructure protection: challenges and design options.
IEEE Wirel. Commun., 2010

Adaptable Security in Wireless Sensor Networks by Using Reconfigurable ECC Hardware Coprocessors.
Int. J. Distributed Sens. Networks, 2010

Self-Adapting Event Configuration in Ubiquitous Wireless Sensor Networks.
Int. J. Adapt. Resilient Auton. Syst., 2010

ILA: Idle Listening Avoidance in Scheduled Wireless Sensor Networks.
Proceedings of the Wired/Wireless Internet Communications, 8th International Conference, 2010

Short ECC - A Lightweight Security Approach for Wireless Sensor Networks.
Proceedings of the SECRYPT 2010, 2010

Automated mapping of MAC parameters into generic QoS parameters by Inter-MAC adaptors.
Proceedings of the IEEE 21st International Symposium on Personal, 2010

Limiting end-to-end delays in long-lasting sensor networks.
Proceedings of the 8th ACM International Workshop on Mobility Management & Wireless Access, 2010

On Efficient Clock Drift Prediction Means and their Applicability to IEEE 802.15.4.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

Body area network for first responders: a case study.
Proceedings of the 5th International ICST Conference on Body Area Networks, 2010

2009
Privacy from Promises to Protection.
Mob. Networks Appl., 2009

On Prolonging Sensornode Gateway Lifetime by Adapting Its Duty Cycle.
Proceedings of the Wired/Wireless Internet Communications, 7th International Conference, 2009

An Inter-MAC architecture for heterogeneous gigabit home networks.
Proceedings of the IEEE 20th International Symposium on Personal, 2009

Customizing sensor nodes and software for individual pervasive health applications.
Proceedings of the 3rd International Conference on Pervasive Computing Technologies for Healthcare, 2009

Adaptive pruning of event decision trees for energy efficient collaboration in event-driven WSN.
Proceedings of the 6th Annual International Conference on Mobile and Ubiquitous Systems: Computing, 2009

A cross-layer approach for data replication and gathering in decentralized long-living wireless sensor networks.
Proceedings of the International Symposium on Autonomous Decentralized Systems (ISADS 2009), 2009

An Engineering Approach for Secure and Safe Wireless Sensor and Actuator Networks for Industrial Automation Systems.
Proceedings of 12th IEEE International Conference on Emerging Technologies and Factory Automation, 2009

tinyDSM: A highly reliable cooperative data storage for Wireless Sensor Networks.
Proceedings of the 2009 International Symposium on Collaborative Technologies and Systems, 2009

Completely Distributed Low Duty Cycle Communication for Long-Living Sensor Networks.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

A Wireless Sensor Network Architecture for Homeland Security Application.
Proceedings of the Ad-Hoc, Mobile and Wireless Networks, 8th International Conference, 2009

2008
Guest editorial: Service-oriented computing.
ACM Trans. Internet Techn., 2008

Public key cryptography empowered smart dust is affordable.
Int. J. Sens. Networks, 2008

Adapting pervasive systems to multiuser privacy requirements.
Int. J. Ad Hoc Ubiquitous Comput., 2008

Enhancing reliability of sensor networks by fine tuning their event observation behavior.
Proceedings of the 9th IEEE International Symposium on a World of Wireless, 2008

Privacy guaranteeing execution containers: one time use of personal data by location based services.
Proceedings of the 1st International Conference on MOBILe Wireless MiddleWARE, 2008

In-network-aggregation as case study for a support tool reducing the complexity of designing secure wireless sensor networks.
Proceedings of the LCN 2008, 2008

2007
An Area Efficient Realisation of AES for Wireless Devices (Eine flächeneffiziente AES Hardwarerealisierung für drahtlose Geräte).
it Inf. Technol., 2007

Crosslayer firewall interaction as a means to provide effective and efficient protection at mobile devices.
Comput. Commun., 2007

Combinatorial Logic Circuitry as Means to Protect Low Cost Devices Against Side Channel Attacks.
Proceedings of the Information Security Theory and Practices. Smart Cards, 2007

The Privacy Advocate (PrivAd) - A Framework for Negotiating Individual Privacy Contracts.
Proceedings of the WEBIST 2007, 2007

The Privacy Advocate: Assertion of Privacy by Personalised Contracts.
Proceedings of the Web Information Systems and Technologies, 2007

Enhancing Privacy by Applying Information Flow Modelling in Pervasive Systems.
Proceedings of the On the Move to Meaningful Internet Systems 2007: OTM 2007 Workshops, 2007

A self-configuring privacy management architecture for pervasive systems.
Proceedings of the Fifth ACM International Workshop on Mobility Management & Wireless Access, 2007

Flexible hardware reduction for elliptic curve cryptography in GF(2<i><sup>m</sup></i>).
Proceedings of the 2007 Design, Automation and Test in Europe Conference and Exposition, 2007

On Concealed Data Aggregation for WSNs.
Proceedings of the 4th IEEE Consumer Communications and Networking Conference, 2007

2006
Wireless network security.
Wirel. Commun. Mob. Comput., 2006

Protecting privacy in e-cash schemes by securing hidden identity approaches against statistical attacks.
Internet Res., 2006

Efficient Protection of Mobile Devices by Cross Layer Interaction of Firewall Approaches.
Proceedings of the Wired/Wireless Internet Communications, 4th International Conference, 2006

How public key cryptography influences wireless sensor node lifetime.
Proceedings of the 4th ACM Workshop on Security of ad hoc and Sensor Networks, 2006

2005
Charged Location Aware Services.
Proceedings of the Wireless Information Systems, 2005

Implementation Independent Profiling of SDL Specifications.
Proceedings of the Software Engineering 2005, 2005

Charged Location Aware Services - A Privacy Analysis.
Proceedings of the 2005 International Conference on Mobile Business (ICMB 2005), 2005

Area Efficient Hardware Implementation of Elliptic Curve Cryptography by Iteratively Applying Karatsuba's Method.
Proceedings of the 2005 Design, 2005

Automated Negotiation of Privacy Contracts.
Proceedings of the 29th Annual International Computer Software and Applications Conference, 2005

2004
Some open issues on internetworking for the next generation.
Comput. Commun., 2004

Protocol engineering for wired and wireless networks.
Comput. Commun., 2004

A location-aware Revocation Approach.
Proceedings of the 34. Jahrestagung der Gesellschaft für Informatik, 2004

2003
Towards automatic negotiation of privacy contracts for Internet services.
Proceedings of the 11th IEEE International Conference on Networks, 2003

2002
Vertical optimization of data transmission for mobile wireless terminals.
IEEE Wirel. Commun., 2002

Shielding TCP from Wireless Link Errors: Retransmission Effort and Fragmentation.
J. Supercomput., 2002

Editorial Comments.
J. Supercomput., 2002

Towards User Defined Privacy in Location- Aware Platforms.
Proceedings of the International Conference on Internet Computing, 2002

2001
Gestaltung konfigurierbarer Codegeneratoren für die automatische Erzeugung effizienter Protokollimplementierungen.
PhD thesis, 2001

Evaluation of Well-Known Protocol Implementation Techniques for Application in Wireless Networks.
J. Supercomput., 2001

Optimizing the Cooperation Between TCP and Wireless MAC.
Proceedings of the International Conference on Internet Computing, 2001

Automated Derivation of ILP Implementations from SDL Specifications.
Proceedings of the Formal Techniques for Networked and Distributed Systems, 2001

2000
Improving the efficiency of automated protocol implementations using a configurable FDT compiler.
Comput. Commun., 2000

Evaluation of Well-Known Protocol Implementation Techniques for Application in Mobile Networks.
Proceedings of the International Conference on Internet Computing, 2000

Leistungsbewertung von SDL-Spezifikationen - Ein Werkzeug zur Bewertung von Implementierungstechniken.
Proceedings of the Formale Beschreibungstechniken für verteilte Systeme, 2000

1999
Effiziente Abbildung von SDL-Spezifikationen auf Activity-Threads mittels Transition Reordering.
Prax. Inf.verarb. Kommun., 1999

COCOS - A configurable SDL compiler for generating efficient protocol implementations.
Proceedings of the SDL '99 The Next Millennium, 1999

Automated Protocol Implementations Based on Activity Threads.
Proceedings of the Seventh Annual International Conference on Network Protocols, 1999

Deriving Activity Thread Implementations from Formal Descriptions Using Transition Reordering.
Proceedings of the Formal Methods for Protocol Engineering and Distributed Systems, 1999

Automatische Generierung effizienter Protokollimplementierungen.
Proceedings of the Formale Beschreibungstechniken für verteilte Systeme, 1999

1998
Eine SDL-Laufzeitumgebung zur Unterstützung unterschiedlicher Implementationsstrategien.
Proceedings of the Formale Beschreibungstechniken für verteilte Systeme, 1998

1997
iSDL: Ein Ansatz zur Integration leistungssteigernder Implementierungsvorgaben in SDL'92.
Proceedings of the Formale Beschreibungstechniken für verteilte Systeme, 1997

1996
Design and Optimization of High-Performance Protocols with the DO-IT Toolbox.
Proceedings of the Formal Description Techniques IX: Theory, 1996


  Loading...