Steffen Peter

Orcid: 0000-0001-6490-2124

According to our database1, Steffen Peter authored at least 41 papers between 2006 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Generation and Verification of Timing Attack Resilient Schedules During the High-Level Synthesis of Integrated Circuits.
Behavioral Synthesis for Hardware Security, 2022

2017
Adaptive embedded control of cyber-physical systems using reinforcement learning.
IET Cyper-Phys. Syst.: Theory & Appl., 2017

2016
Fuzzy logic based adaptive hierarchical scheduling for periodic real-time tasks.
SIGBED Rev., 2016

Design of Secure ECG-Based Biometric Authentication in Body Area Sensor Networks.
Sensors, 2016

Conjugate gradient acceleration of iteratively re-weighted least squares methods.
Comput. Optim. Appl., 2016

Towards a timing attack aware high-level synthesis of integrated circuits.
Proceedings of the 34th IEEE International Conference on Computer Design, 2016

2015
Damping Noise-Folding and Enhanced Support Recovery in Compressed Sensing.
IEEE Trans. Signal Process., 2015

Component-Based Synthesis of Embedded Systems Using Satisfiability Modulo Theories.
ACM Trans. Design Autom. Electr. Syst., 2015

Improving Energy Efficiency and Thermal Comfort of Smart Buildings with HVAC Systems in the Presence of Sensor Faults.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

From the browser to the remote physical lab: Programming cyber-physical systems.
Proceedings of the 2015 IEEE Frontiers in Education Conference, 2015

Including variability of physical models into the design automation of cyber-physical systems.
Proceedings of the 52nd Annual Design Automation Conference, 2015

2014
Adaptive resource synchronization in hierarchical real-time systems.
SIGBED Rev., 2014

A Survey on Concepts, Applications, and Challenges in Cyber-Physical Systems.
KSII Trans. Internet Inf. Syst., 2014

GALS design of ECC against side-channel attacks - A comparative study.
Proceedings of the 24th International Workshop on Power and Timing Modeling, 2014

Resource Synchronization in Hierarchically Scheduled Real-Time Systems Using Preemptive Critical Sections.
Proceedings of the 17th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing, 2014

Integration and evaluation of intrusion detection for CoAP in smart city applications.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

2013
Sens4U: Wireless sensor network applications for environment monitoring made easy.
Proceedings of the 4th International Workshop on Software Engineering for Sensor Network Applications, 2013

Self-organized Bluetooth scatternets for wireless sensor networks.
Proceedings of the 11th ACM Conference on Embedded Network Sensor Systems, 2013

Real-Life Deployment of Bluetooth Scatternets for Wireless Sensor Networks.
Proceedings of the Real-World Wireless Sensor Networks, 2013

Utilizing Intervals in Component-Based Design of Cyber Physical Systems.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013

Modeling and Mitigation of Faults in Cyber-physical Systems with Binary Sensors.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013

2012
Design of a sensor node crypto processor for IEEE 802.15.4 applications.
Proceedings of the IEEE 25th International SOC Conference, 2012

Towards Strong Security in Embedded and Pervasive Systems: Energy and Area Optimized Serial Polynomial Multipliers in GF(2k).
Proceedings of the 5th International Conference on New Technologies, 2012

Tool-Supported Methodology for Component-Based Design of Wireless Sensor Network Applications.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference Workshops, 2012

2011
Tool-supported development of secure wireless sensor networks.
PhD thesis, 2011

Bluetooth Scatternet Tree Formation for Wireless Sensor Networks.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011

Sensor node processor for security applications.
Proceedings of the 18th IEEE International Conference on Electronics, Circuits and Systems, 2011

2010
A Survey on the Encryption of Convergecast Traffic with In-Network Processing.
IEEE Trans. Dependable Secur. Comput., 2010

Adaptable Security in Wireless Sensor Networks by Using Reconfigurable ECC Hardware Coprocessors.
Int. J. Distributed Sens. Networks, 2010

Inferring Technical Constraints of a Wireless Sensor Network Application from End-User Requirements.
Proceedings of the Sixth International Conference on Mobile Ad-hoc and Sensor Networks, 2010

How Key Establishment in Medical Sensor Networks Benefits from Near Field Communication Technology.
Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications, 2010

2009
An Engineering Approach for Secure and Safe Wireless Sensor and Actuator Networks for Industrial Automation Systems.
Proceedings of 12th IEEE International Conference on Emerging Technologies and Factory Automation, 2009

tinyDSM: A highly reliable cooperative data storage for Wireless Sensor Networks.
Proceedings of the 2009 International Symposium on Collaborative Technologies and Systems, 2009

2008
Public key cryptography empowered smart dust is affordable.
Int. J. Sens. Networks, 2008

An Encryption-Enabled Network Protocol Accelerator.
Proceedings of the Wired/Wireless Internet Communications, 6th International Conference, 2008

In-network-aggregation as case study for a support tool reducing the complexity of designing secure wireless sensor networks.
Proceedings of the LCN 2008, 2008

2007
Crosslayer firewall interaction as a means to provide effective and efficient protection at mobile devices.
Comput. Commun., 2007

Combinatorial Logic Circuitry as Means to Protect Low Cost Devices Against Side Channel Attacks.
Proceedings of the Information Security Theory and Practices. Smart Cards, 2007

Flexible hardware reduction for elliptic curve cryptography in GF(2<i><sup>m</sup></i>).
Proceedings of the 2007 Design, Automation and Test in Europe Conference and Exposition, 2007

On Concealed Data Aggregation for WSNs.
Proceedings of the 4th IEEE Consumer Communications and Networking Conference, 2007

2006
How public key cryptography influences wireless sensor node lifetime.
Proceedings of the 4th ACM Workshop on Security of ad hoc and Sensor Networks, 2006


  Loading...