default search action
Peter Langendörfer
Person information
- affiliation: Technischen Universität Cottbus, Germany
- affiliation (former): IHP GmbH - Leibniz Institute for Innovations for High Performance Microelectronics
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j46]Wael Alsabbagh, Chaerin Kim, Peter Langendörfer:
Investigating the Security of OpenPLC: Vulnerabilities, Attacks, and Mitigation Solutions. IEEE Access 12: 11561-11583 (2024) - [j45]Benjamin Förster, Peter Langendörfer, Thomas Hinze:
Determining Distributions of Security Means for WSNs Based on the Model of a Neighborhood Watch. IEEE Access 12: 74343-74366 (2024) - [j44]Marcin Aftowicz, Ievgen Kabin, Zoya Dyka, Peter Langendörfer:
Non-Profiled Unsupervised Horizontal Iterative Attack against Hardware Elliptic Curve Scalar Multiplication Using Machine Learning. Future Internet 16(2): 45 (2024) - [j43]Marcin Aftowicz, Ievgen Kabin, Zoya Dyka, Peter Langendoerfer:
Advantages of unsupervised learning analysis methods in single-trace SCA attacks. Microprocess. Microsystems 105: 104994 (2024) - [c170]Wael Alsabbagh, Chaerin Kim, Nitin Sanjay Patil, Peter Langendörfer:
Beyond the Lens: False Data Injection Attacks on IIoT-Cameras through MQTT Manipulation. CIoT 2024: 1-7 - [c169]Ievgen Kabin, Zoya Dyka, Alkistis Aikaterini Sigourou, Peter Langendoerfer:
Static Power Consumption as a New Side-Channel Analysis Threat to Elliptic Curve Cryptography Implementations. CSR 2024: 884-889 - [c168]Ievgen Kabin, Jan Schäffner, Alkistis Aikaterini Sigourou, Dmytro Petryk, Zoya Dyka, Dominik Klein, Sven Freud, Peter Langendoerfer:
Stealth Attacks on PCBs: An Experimental Plausibility Analysis. CSR 2024: 905-912 - [c167]Benjamin Förster, Thomas Hinze, Peter Langendörfer:
Topology- and Resource-Based Distribution Scheme for Collaborative Security-Focused Design Space Exploration in Large-Scale Static WSNs. ITNAC 2024: 1-6 - [c166]Kai Lehniger, Peter Langendörfer:
StackSpecter: Detecting Stack Buffer Overflows for the Xtensa Architecture. ITNAC 2024: 1-7 - [c165]Ievgen Kabin, Peter Langendoerfer, Zoya Dyka:
Exploiting Static Power Consumption in Side-Channel Analysis. LATS 2024: 1-4 - [c164]Zoya Dyka, Ievgen Kabin, Marcin Brzozowski, Goran Panic, Cristiano Calligaro, Milos Krstic, Peter Langendoerfer:
On the Influence of Cell Libraries and Other Parameters to SCA Resistance of Crypto IP Cores. MECO 2024: 1-5 - [c163]Kai Lehniger, Shuba Pradha Raghunathan, Peter Langendörfer:
WindowGuardian: Return Address Integrity for ESP32 Microcontrollers with Xtensa Processors using AES and Register Windows. MECO 2024: 1-8 - [c162]Dmytro Petryk, Ievgen Kabin, Peter Langendörfer, Zoya Dyka:
On the Importance of Reproducibility of Experimental Results Especially in the Domain of Security. MECO 2024: 1-5 - [c161]Ronald Chitauro, Marcin Brzozowski, Onur Yener, Peter Langendörfer:
Out of Distribution Generalization: KPI vs Spectrogram Based Jamming Classification in 5G. SoftCOM 2024: 1-6 - [c160]Wael Alsabbagh, Chaerin Kim, Peter Langendörfer:
Silent Sabotage: A Stealthy Control Logic Injection in IIoT Systems. SVCC 2024: 1-8 - [i40]Oxana Shamilyan, Ievgen Kabin, Zoya Dyka, Peter Langendoerfer:
Distributed Artificial Intelligence as a Means to Achieve Self-X-Functions for Increasing Resilience: the First Steps. CoRR abs/2404.06159 (2024) - [i39]Oxana Shamilyan, Ievgen Kabin, Zoya Dyka, Oleksandr O. Sudakov, Andrii Cherninskyi, Marcin Brzozowski, Peter Langendoerfer:
Intelligence and Motion Models of Continuum Robots: an Overview. CoRR abs/2404.06171 (2024) - [i38]Oxana Shamilyan, Ievgen Kabin, Zoya Dyka, Peter Langendoerfer:
Resilient Movement Planning for Continuum Robots. CoRR abs/2404.06178 (2024) - [i37]Pavlo Mykytyn, Marcin Brzozowski, Zoya Dyka, Peter Langendörfer:
Towards Secure and Reliable Heterogeneous Real-time Telemetry Communication in Autonomous UAV Swarms. CoRR abs/2404.07557 (2024) - [i36]Dmytro Petryk, Zoya Dyka, Milos Krstic, Jan Belohoubek, Petr Fiser, Frantisek Steiner, Tomás Blecha, Peter Langendörfer, Ievgen Kabin:
On the Influence of the Laser Illumination on the Logic Cells Current Consumption. CoRR abs/2407.06758 (2024) - [i35]Dmytro Petryk, Ievgen Kabin, Peter Langendörfer, Zoya Dyka:
On the Importance of Reproducibility of Experimental Results Especially in the Domain of Security. CoRR abs/2407.06760 (2024) - [i34]Sze Hei Li, Zoya Dyka, Alkistis Aikaterini Sigourou, Peter Langendoerfer, Ievgen Kabin:
Practical Investigation on the Distinguishability of Longa's Atomic Patterns. CoRR abs/2409.11868 (2024) - [i33]Alkistis Aikaterini Sigourou, Zoya Dyka, Sze Hei Li, Peter Langendoerfer, Ievgen Kabin:
Revisiting Atomic Patterns for Elliptic Curve Scalar Multiplication Revealing Inherent Vulnerability to Simple SCA. CoRR abs/2412.03218 (2024) - [i32]Kai Lehniger, Peter Langendörfer:
Comments on: RIO: Return Instruction Obfuscation for Bare-Metal IoT Devices with Binary Analysis. CoRR abs/2412.08257 (2024) - 2023
- [j42]Oxana Shamilyan, Ievgen Kabin, Zoya Dyka, Oleksandr O. Sudakov, Andrii Cherninskyi, Marcin Brzozowski, Peter Langendoerfer:
Intelligence and Motion Models of Continuum Robots: An Overview. IEEE Access 11: 60988-61003 (2023) - [j41]Kai Lehniger, Abdelaziz Saad, Peter Langendörfer:
Finding gadgets in incremental code updates for return-oriented programming attacks on resource-constrained devices. Ann. des Télécommunications 78(3-4): 209-220 (2023) - [j40]Kai Lehniger, Peter Langendörfer:
Through the Window: Exploitation and Countermeasures of the ESP32 Register Window Overflow. Future Internet 15(6): 217 (2023) - [j39]Maryam Assafo, Jost Philipp Städter, Tenia Meisel, Peter Langendörfer:
On the Stability and Homogeneous Ensemble of Feature Selection for Predictive Maintenance: A Classification Application for Tool Condition Monitoring in Milling. Sensors 23(9): 4461 (2023) - [j38]Kai Lehniger, Peter Langendörfer:
Window Canaries: Re-Thinking Stack Canaries for Architectures With Register Windows. IEEE Trans. Dependable Secur. Comput. 20(6): 4637-4647 (2023) - [c159]Wael Alsabbagh, Samuel Amogbonjaye, Diego Urrego, Peter Langendörfer:
A Stealthy False Command Injection Attack on Modbus based SCADA Systems. CCNC 2023: 1-9 - [c158]Ali Haddadi Esfahani, Oliver Maye, Max Frohberg, Maria Speh, Micheal Jöbges, Peter Langendörfer:
Real Time Detection of Freezing of Gait of Parkinson Patients based on Machine Learning Running on a Body Worn Device. CENTERIS/ProjMAN/HCist 2023: 177-184 - [c157]Ali Haddadi Esfahani, Oliver Maye, Max Frohberg, Maria Speh, Michael Jöbges, Peter Langendörfer:
Machine Learning based Real Time Detection of Freezing of Gait of Parkinson Patients Running on a Body Worn Device. CHASE 2023: 181-182 - [c156]Ievgen Kabin, Zoya Dyka, Peter Langendoerfer:
Randomized Addressing Countermeasures are Inefficient Against Address-Bit SCA. CSR 2023: 580-585 - [c155]Marcin Aftowicz, Ievgen Kabin, Zoya Dyka, Peter Langendörfer:
Non-Profiled Semi-Supervised Horizontal Attack Against Elliptic Curve Scalar Multiplication Using Support Vector Machines. DSD 2023: 708-713 - [c154]Ievgen Kabin, Peter Langendoerfer, Zoya Dyka:
Vulnerability of Atomic Patterns to Simple SCA. EWDTS 2023: 1-4 - [c153]Wael Alsabbagh, Chaerin Kim, Peter Langendörfer:
No Attacks Are Available: Securing the OpenPLC and Related Systems. GI-Jahrestagung 2023: 2085-2096 - [c152]Dmytro Petryk, Zoya Dyka, Milos Krstic, Jan Belohoubek, Petr Fiser, Frantisek Steiner, Tomás Blecha, Peter Langendörfer, Ievgen Kabin:
On the Influence of the Laser Illumination on the Logic Cells Current Consumption : First measurement results. ICECS 2023: 1-6 - [c151]Wael Alsabbagh, Chaerin Kim, Peter Langendörfer:
Good Night, and Good Luck: A Control Logic Injection Attack on OpenPLC. IECON 2023: 1-8 - [c150]Ronald Chitauro, Marcin Brzozowski, Onur Yener, Peter Langendörfer:
Real-Time Jamming Detection, Classification and Logging Using Computer Vision in 5G Private Networks. ISWCS 2023: 1-6 - [c149]Benjamin Förster, Peter Langendörfer, Thomas Hinze:
Novel Approach to a Plant Inspired Distributed Security Scheme for Wireless Sensor Networks. MECO 2023: 1-6 - [c148]Kai Lehniger, Marcin Aftowicz, Mario Schölzel, Peter Langendörfer:
Coarse-grained Control Flow Integrity Check for Processors with Sliding Register Windows. MECO 2023: 1-7 - [c147]Pavlo Mykytyn, Marcin Brzozowski, Zoya Dyka, Peter Langendoerfer:
GPS-Spoofing Attack Detection Mechanism for UAV Swarms. MECO 2023: 1-8 - [c146]Alkistis Aikaterini Sigourou, Ievgen Kabin, Peter Langendörfer, Nicolas Sklavos, Zoya Dyka:
Successful Simple Side Channel Analysis: Vulnerability of an atomic pattern $kP$ algorithm implemented with a constant time crypto library to simple electromagnetic analysis attacks. MECO 2023: 1-6 - [c145]Wael Alsabbagh, Peter Langendörfer:
You Are What You Attack: Breaking the Cryptographically Protected S7 Protocol. WFCS 2023: 1-8 - [i31]Pavlo Mykytyn, Marcin Brzozowski, Zoya Dyka, Peter Langendoerfer:
GPS-Spoofing Attack Detection Mechanism for UAV Swarms. CoRR abs/2301.12766 (2023) - 2022
- [j37]Cristian Martín, Peter Langendoerfer, Pouya Soltani Zarrin, Manuel Díaz, Bartolomé Rubio:
Kafka-ML: Connecting the data stream with ML/AI frameworks. Future Gener. Comput. Syst. 126: 15-33 (2022) - [j36]Ievgen Kabin, Zoya Dyka, Peter Langendoerfer:
Atomicity and Regularity Principles Do Not Ensure Full Resistance of ECC Designs against Single-Trace Attacks. Sensors 22(8): 3083 (2022) - [c144]Kai Lehniger, Mario Schölzel, Jonas Jelonek, Peter Tabatt, Marcin Aftowicz, Peter Langendörfer:
Combination of ROP Defense Mechanisms for Better Safety and Security in Embedded Systems. DSD 2022: 480-487 - [c143]Wael Alsabbagh, Peter Langendörfer:
No Need to be Online to Attack - Exploiting S7-1500 PLCs by Time-Of-Day Block. ICAT 2022: 1-8 - [c142]Kai Lehniger, Peter Langendörfer:
Through the Window: On the exploitability of Xtensa's Register Window Overflow. ITNAC 2022: 353-358 - [c141]Zoya Dyka, Ievgen Kabin, Marcin Brzozowski, Goran Panic, Cristiano Calligaro, Milos Krstic, Peter Langendoerfer:
On the SCA Resistance of Crypto IP Cores. LATS 2022: 1-2 - [c140]Marcin Aftowicz, Kai Lehniger, Peter Langendoerfer:
Scalable FPGA Hardware Accelerator for SVM Inference. MECO 2022: 1-4 - [c139]Oxana Shamilyan, Ievgen Kabin, Zoya Dyka, Peter Langendoerfer:
Distributed Artificial Intelligence as a Means to Achieve Self-X-Functions for Increasing Resilience: the First Steps. MECO 2022: 1-6 - [c138]P. Tabatt, Jonas Jelonek, Mario Schölzel, Kai Lehniger, Peter Langendörfer:
Code Mutation as a mean against ROP Attacks for Embedded Systems. MECO 2022: 1-4 - [c137]Batyi Amatov, Kai Lehniger, Peter Langendörfer:
Return-Oriented Programming Gadget Catalog for the Xtensa Architecture. PerCom Workshops 2022: 655-660 - [c136]Marcin Brzozowski, Peter Langendoerfer, Augusto Casaca, António Grilo, Manuel Diaz, Cristian Martín, José Camacho, Giada Landi:
UNITE: Integrated IoT-Edge-Cloud Continuum. WF-IoT 2022: 1-6 - [i30]Ievgen Kabin, Zoya Dyka, Dan Kreiser, Peter Langendoerfer:
Unified Field Multiplier for ECC: Inherent Resistance against Horizontal SCA Attacks. CoRR abs/2201.01147 (2022) - [i29]Ievgen Kabin, Alejandro Sosa, Zoya Dyka, Dan Klann, Peter Langendoerfer:
On the Influence of the FPGA Compiler Optimization Options on the Success of the Horizontal Attack. CoRR abs/2201.01153 (2022) - [i28]Ievgen Kabin, Zoya Dyka, Dan Klann, Nele Mentens, Lejla Batina, Peter Langendoerfer:
Breaking a fully Balanced ASIC Coprocessor Implementing Complete Addition Formulas on Weierstrass Elliptic Curves. CoRR abs/2201.01158 (2022) - [i27]R. Kovtun, Sergiy Radchenko, Andrii Netreba, Oleksandr O. Sudakov, Roman Natarov, Zoya Dyka, Ievgen Kabin, Peter Langendörfer:
Exploiting EEG Signals for Eye Motion Tracking. CoRR abs/2201.01181 (2022) - [i26]Roman Natarov, Oleksandr O. Sudakov, Zoya Dyka, Ievgen Kabin, Oleksandr Maksymyuk, Olena Iegorova, Oleg Krishtal, Peter Langendörfer:
Resilience Aspects in Distributed Wireless Electroencephalographic Sampling. CoRR abs/2201.01272 (2022) - [i25]Marcin Aftowicz, Ievgen Kabin, Dan Klann, Yauhen Varabei, Zoya Dyka, Peter Langendoerfer:
Horizontal SCA Attacks against kP Algorithm Using K-Means and PCA. CoRR abs/2201.01711 (2022) - [i24]Marcin Aftowicz, Ievgen Kabin, Zoya Dyka, Peter Langendoerfer:
Clustering versus Statistical Analysis for SCA: when Machine Learning is Better. CoRR abs/2201.01717 (2022) - [i23]Zoya Dyka, Dan Kreiser, Ievgen Kabin, Peter Langendoerfer:
Flexible FPGA ECDSA Design with a Field Multiplier Inherently Resistant against HCCA. CoRR abs/2201.02007 (2022) - [i22]Ievgen Kabin, Zoya Dyka, Dan Kreiser, Peter Langendoerfer:
Methods for Increasing the Resistance of Cryptographic Designs against Horizontal DPA Attacks. CoRR abs/2201.02391 (2022) - [i21]Ievgen Kabin, Zoya Dyka, Dan Klann, Peter Langendoerfer:
Horizontal DPA Attacks against ECC: Impact of Implemented Field Multiplication Formula. CoRR abs/2201.02866 (2022) - [i20]Ievgen Kabin, Zoya Dyka, Dan Klann, Peter Langendoerfer:
Horizontal Attacks against ECC: from Simulations to ASIC. CoRR abs/2201.02868 (2022) - [i19]Pavlo Mykytyn, Marcin Brzozowski, Zoya Dyka, Peter Langendoerfer:
Jamming Detection for IR-UWB Ranging Technology in Autonomous UAV Swarms. CoRR abs/2201.04425 (2022) - [i18]Kai Lehniger, Marcin J. Aftowicz, Peter Langendörfer, Zoya Dyka:
Challenges of Return-Oriented-Programming on the Xtensa Hardware Architecture. CoRR abs/2201.06785 (2022) - [i17]Oxana Shamilyan, Ievgen Kabin, Zoya Dyka, Michael Kuba, Peter Langendoerfer:
Octopuses: biological facts and technical solutions. CoRR abs/2201.07885 (2022) - [i16]Ievgen Kabin, Zoya Dyka, Dan Klann, Jan Schäffner, Peter Langendoerfer:
On the Complexity of Attacking Elliptic Curve Based Authentication Chips. CoRR abs/2201.09631 (2022) - [i15]Benjamin Förster, Peter Langendörfer, Thomas Hinze:
Determining Distributions of Security Means for Wireless Sensor Networks based on the Model of a Neighbourhood Watch. CoRR abs/2212.09050 (2022) - 2021
- [j35]Maryam Assafo, Peter Langendörfer:
A TOPSIS-Assisted Feature Selection Scheme and SOM-Based Anomaly Detection for Milling Tools Under Different Operating Conditions. IEEE Access 9: 90011-90028 (2021) - [j34]Ali Haddadi Esfahani, Zoya Dyka, Steffen Ortmann, Peter Langendörfer:
Impact of Data Preparation in Freezing of Gait Detection Using Feature-Less Recurrent Neural Network. IEEE Access 9: 138120-138131 (2021) - [j33]Ievgen Kabin, Zoya Dyka, Dan Klann, Marcin Aftowicz, Peter Langendoerfer:
Resistance of the Montgomery Ladder Against Simple SCA: Theory and Practice. J. Electron. Test. 37(3): 289-303 (2021) - [j32]Elisabeth Vogel, Zoya Dyka, Dan Klann, Peter Langendörfer:
Resilience in the Cyberworld: Definitions, Features and Models. Future Internet 13(11): 293 (2021) - [j31]Ievgen Kabin, Zoya Dyka, Dan Klann, Jan Schäffner, Peter Langendörfer:
On the Complexity of Attacking Commercial Authentication Products. Microprocess. Microsystems 80: 103480 (2021) - [j30]Dmytro Petryk, Zoya Dyka, Eduardo Pérez, Ievgen Kabin, Jens Katzer, Jan Schäffner, Peter Langendörfer:
Sensitivity of HfO2-based RRAM Cells to Laser Irradiation. Microprocess. Microsystems 87: 104376 (2021) - [c135]Patrick Langer, Ali Haddadi Esfahani, Zoya Dyka, Peter Langendörfer:
FPGA-Based Realtime Detection of Freezing of Gait of Parkinson Patients. BODYNETS 2021: 101-111 - [c134]AbdElaziz Saad AbdElaziz AbdElaal, Kai Lehniger, Peter Langendörfer:
Incremental code updates exploitation as a basis for return oriented programming attacks on resource-constrained devices. CSNet 2021: 55-62 - [c133]Ievgen Kabin, Dan Klann, Zoya Dyka, Peter Langendoerfer:
Fast Dual-Field ECDSA Accelerator with Increased Resistance against Horizontal SCA Attacks. CSR 2021: 273-280 - [c132]Dmytro Petryk, Zoya Dyka, Roland Sorge, Jan Schäffner, Peter Langendörfer:
Optical Fault Injection Attacks against Radiation-Hard Shift Registers. DSD 2021: 371-375 - [c131]Alejandro Sosa, Zoya Dyka, Ievgen Kabin, Peter Langendörfer:
Simulation of Electromagnetic Emanation of Cryptographic ICs: Tools, Methods, Problems. EWDTS 2021: 1-5 - [c130]Wael Alsabbagh, Peter Langendörfer:
A Stealth Program Injection Attack against S7-300 PLCs. ICIT 2021: 986-993 - [c129]Wael Alsabbagh, Peter Langendörfer:
Patch Now and Attack Later - Exploiting S7 PLCs by Time-Of-Day Block. ICPS 2021: 144-151 - [c128]Wael Alsabbagh, Peter Langendörfer:
A Control Injection Attack against S7 PLCs -Manipulating the Decompiled Code. IECON 2021: 1-8 - [c127]Pouya Soltani Zarrin, Cristian Martín, Peter Langendoerfer, Christian Wenger, Manuel Diaz:
Vibration Analysis of a Wind Turbine Gearbox for Off-cloud Health Monitoring through Neuromorphic-computing. IECON 2021: 1-5 - [c126]Wael Alsabbagh, Peter Langendörfer:
A Fully-Blind False Data Injection on PROFINET I/O Systems. ISIE 2021: 1-8 - [c125]Ievgen Kabin, Zoya Dyka, Dan Klann, Peter Langendoerfer:
EC Scalar Multiplication: Successful Simple Address-Bit SCA Attack against Atomic Patterns. LATS 2021: 1-2 - [c124]Marcin Aftowicz, Ievgen Kabin, Zoya Dyka, Peter Langendörfer:
Clustering versus Statistical Analysis for SCA: when Machine Learning is Better. MECO 2021: 1-5 - [c123]Zoya Dyka, Ievgen Kabin, Dan Klann, Peter Langendörfer:
Multiplier as a Mean for Reducing Vulnerability of Atomic Patterns to Horizontal Address-Bit Attacks. MECO 2021: 1-6 - [c122]Pavlo Mykytyn, Marcin Brzozowski, Zoya Dyka, Peter Langendörfer:
Jamming Detection for IR-UWB Ranging Technology in Autonomous UAV Swarms. MECO 2021: 1-6 - [c121]Oxana Shamilyan, Ievgen Kabin, Zoya Dyka, Michael Kuba, Peter Langendörfer:
Octopuses: biological facts and technical solutions. MECO 2021: 1-7 - [c120]Ievgen Kabin, Zoya Dyka, Dan Klann, Marcin Aftowicz, Peter Langendörfer:
FFT based Horizontal SCA Attack against ECC. NTMS 2021: 1-5 - [i14]Dmytro Petryk, Zoya Dyka, Peter Langendörfer:
Sensitivity of Standard Library Cells to Optical Fault Injection Attacks in IHP 250 nm Technology. CoRR abs/2103.12433 (2021) - [i13]Dmytro Petryk, Zoya Dyka, Eduardo Pérez, Mamathamba Kalishettyhalli Mahadevaiaha, Ievgen Kabin, Christian Wenger, Peter Langendörfer:
Evaluation of the Sensitivity of RRAM Cells to Optical Fault Injection Attacks. CoRR abs/2103.12435 (2021) - [i12]Dmytro Petryk, Zoya Dyka, Jens Katzer, Peter Langendörfer:
Metal Fillers as Potential Low Cost Countermeasure against Optical Fault Injection Attacks. CoRR abs/2103.12436 (2021) - [i11]Elisabeth Vogel, Zoya Dyka, Dan Klann, Peter Langendörfer:
Resilience in the Cyber World: Definitions, Features and Models. CoRR abs/2105.10235 (2021) - [i10]Dmytro Petryk, Zoya Dyka, Roland Sorge, Jan Schäffner, Peter Langendörfer:
Optical Fault Injection Attacks against Radiation-Hard Registers. CoRR abs/2106.07271 (2021) - [i9]Ievgen Kabin, Zoya Dyka, Dan Klann, Peter Langendörfer:
EC Scalar Multiplication: Successful Simple Address Bit SCA Attack against Atomic Patterns. CoRR abs/2106.12321 (2021) - 2020
- [j29]Ievgen Kabin, Zoya Dyka, Dan Klann, Peter Langendörfer:
Methods increasing inherent resistance of ECC designs against horizontal attacks. Integr. 73: 50-67 (2020) - [j28]Max Frohberg, Peter Langendörfer:
Demonstration of WISDOM - a Wireless in Field Measurement and Debugging Platform for Wireless Sensor Networks and Devices. WiPiEC Journal 6(1) (2020) - [c119]Maksim Jenihhin, Said Hamdioui, Matteo Sonza Reorda, Milos Krstic, Peter Langendörfer, Christian Sauer, Anton Klotz, Michael Hübner, Jörg Nolte, Heinrich Theodor Vierhaus, Georgios N. Selimis, Dan Alexandrescu, Mottaqiallah Taouil, Geert Jan Schrijen, Jaan Raik, Luca Sterpone, Giovanni Squillero, Zoya Dyka:
RESCUE: Interdependent Challenges of Reliability, Security and Quality in Nanoelectronic Systems. DATE 2020: 388-393 - [c118]Kai Lehniger, Marcin J. Aftowicz, Peter Langendörfer, Zoya Dyka:
Challenges of Return-Oriented-Programming on the Xtensa Hardware Architecture. DSD 2020: 154-158 - [c117]Dmytro Petryk, Zoya Dyka, Eduardo Pérez, Mamathamba Kalishettyhalli Mahadevaiaha, Ievgen Kabin, Christian Wenger, Peter Langendörfer:
Evaluation of the Sensitivity of RRAM Cells to Optical Fault Injection Attacks. DSD 2020: 238-245 - [c116]Ievgen Kabin, Zoya Dyka, Dan Klann, Nele Mentens, Lejla Batina, Peter Langendörfer:
Breaking a fully Balanced ASIC Coprocessor Implementing Complete Addition Formulas on Weierstrass Elliptic Curves. DSD 2020: 270-276 - [c115]Dan Klann, Marcin Aftowicz, Ievgen Kabin, Zoya Dyka, Peter Langendörfer:
Integration and Implementation of four different Elliptic Curves in a single high-speed Design considering SCA. DTIS 2020: 1-2 - [c114]R. Kovtun, Sergiy Radchenko, Andrii Netreba, Olexandr O. Sudakov, Roman Natarov, Zoya Dyka, Ievgen Kabin, Peter Langendörfer:
Exploiting EEG Signals for Eye Motion Tracking. EWDTS 2020: 1-5 - [c113]Dmytro Petryk, Zoya Dyka, Jens Katzer, Peter Langendörfer:
Metal Fillers as Potential Low Cost Countermeasure against Optical Fault Injection Attacks. EWDTS 2020: 1-6 - [c112]Ievgen Kabin, Zoya Dyka, Marcin Aftowicz, Dan Klann, Peter Langendörfer:
Resistance of the Montgomery kP Algorithm against Simple SCA: Theory and Practice. LATS 2020: 1-6 - [c111]Marcin Aftowicz, Ievgen Kabin, Dan Klann, Yauhen Varabei, Zoya Dyka, Peter Langendörfer:
Horizontal SCA Attacks against $kP$ Algorithm Using K-Means and PCA. MECO 2020: 1-7 - [c110]Zoya Dyka, Elisabeth Vogel, Ievgen Kabin, Dan Klann, Oxana Shamilyan, Peter Langendörfer:
No Resilience without Security. MECO 2020: 1-5 - [c109]Ievgen Kabin, Zoya Dyka, Peter Langendörfer:
Automated Simple Analysis Attack. MECO 2020: 1-4 - [c108]Roman Natarov, Zoya Dyka, Ruslan Bohovyk, Mykhailo Fedoriuk, Dmytro Isaev, Oleksandr O. Sudakov, Oleksandr Maksymyuk, Oleg Krishtal, Peter Langendörfer:
Artefacts in EEG Signals Epileptic Seizure Prediction using Edge Devices. MECO 2020: 1-3 - [c107]Roman Natarov, Oleksandr O. Sudakov, Zoya Dyka, Ievgen Kabin, Oleksandr Maksymyuk, Olena Iegorova, Oleg Krishtal, Peter Langendörfer:
Resilience Aspects in Distributed Wireless Electroencephalographic Sampling. MECO 2020: 1-7 - [c106]Dmytro Petryk, Zoya Dyka, Peter Langendörfer:
Sensitivity of Standard Library Cells to Optical Fault Injection Attacks in IHP 250 nm Technology. MECO 2020: 1-4 - [c105]Marcin Brzozowski, Peter Langendörfer:
Bonded Wireless Networks: the Gateway to Real-Time Mobile Applications. SoftCOM 2020: 1-6 - [i8]Cristian Martín, Peter Langendörfer, Manuel Díaz, Bartolomé Rubio:
Kafka-ML: connecting the data stream with ML/AI frameworks. CoRR abs/2006.04105 (2020)
2010 – 2019
- 2019
- [j27]Marcin Brzozowski, Max Frohberg, Peter Langendörfer:
Real-world deployments of sensor networks: Practical lessons for researchers. Comput. Commun. 145: 326-334 (2019) - [c104]Ievgen Kabin, Zoya Dyka, Dan Klann, Peter Langendörfer:
Horizontal DPA Attacks against ECC: Impact of Implemented Field Multiplication Formula. DTIS 2019: 1-6 - [c103]Ievgen Kabin, Zoya Dyka, Dan Klann, Peter Langendörfer:
Horizontal Attacks Against ECC: From Simulations to ASIC. IOSec/MSTEC/FINSEC@ESORICS 2019: 64-76 - [c102]Zoya Dyka, Ievgen Kabin, Dan Klann, Frank Vater, Peter Langendörfer:
Caution: GALS-ification as a Means against SCA Attacks. EWDTS 2019: 1-6 - [c101]Zoya Dyka, Ievgen Kabin, Peter Langendörfer:
Researching Resilience a Holistic Approach. EWDTS 2019: 1-4 - [c100]Ievgen Kabin, Zoya Dyka, Dan Klann, Peter Langendörfer:
Fast and Secure Unified Field Multiplier for ECC Based on the 4-Segment Karatsuba Multiplication. EWDTS 2019: 1-6 - [c99]Marcin Aftowicz, Dan Klann, Ievgen Kabin, Zoya Dyka, Peter Langendörfer:
Evaluation of the ECDSA IHP Hardware Accelerator. Krypto-Tag 2019 - [c98]Ievgen Kabin, Marcin Aftowicz, Dan Klann, Yauhen Varabei, Zoya Dyka, Peter Langendörfer:
Horizontal SCA Attack using Machine Learning Algorithms. Krypto-Tag 2019 - [c97]Ievgen Kabin, Zoya Dyka, Dan Klann, Peter Langendörfer:
ECC Based Secure Authentication Solutions. Krypto-Tag 2019 - [c96]Kai Lehniger, Yauhen Varabei, Marcin Aftowicz, Seyed Ehsan Hashemi Rastegar, Zoya Dyka, Peter Langendörfer:
Using machine learning techniques for hardware performance counter classification and ROP attack detection. Krypto-Tag 2019 - [c95]Roman Natarov, Yauhen Varabei, Ievgen Kabin, Zoya Dyka, Peter Langendörfer:
Edge computing devices assessment for cryptography and biomedical signal analysis. Krypto-Tag 2019 - [c94]Alejandro Sosa, Ievgen Kabin, Zoya Dyka, Dan Klann, Peter Langendörfer:
On the Impact of the Sampling Rate on the Success of Horizontal DEMA Attack. Krypto-Tag 2019 - [c93]Yauhen Varabei, Ievgen Kabin, Zoya Dyka, Dan Klann, Peter Langendörfer:
Intelligent Clustering as a Means to Improve K-means Based Horizontal Attacks. Krypto-Tag 2019 - [c92]Zoya Dyka, Elisabeth Vogel, Ievgen Kabin, Marcin Aftowicz, Dan Klann, Peter Langendörfer:
Resilience more than the Sum of Security and Dependability: Cognition is what makes the Difference. MECO 2019: 1-3 - [c91]Ievgen Kabin, Marcin Aftowicz, Yauhen Varabei, Dan Klann, Zoya Dyka, Peter Langendörfer:
Horizontal Attacks using K-Means: Comparison with Traditional Analysis Methods. NTMS 2019: 1-7 - [c90]Ievgen Kabin, Zoya Dyka, Dan Klann, Peter Langendörfer:
On the Complexity of Attacking Commercial Authentication Products. NTMS 2019: 1-6 - [c89]Yauhen Varabei, Ievgen Kabin, Zoya Dyka, Dan Klann, Peter Langendörfer:
Intelligent Clustering as a Means to Improve K-means Based Horizontal Attacks. PIMRC Workshops 2019: 1-6 - [c88]Ievgen Kabin, Alejandro Sosa, Zoya Dyka, Dan Klann, Peter Langendörfer:
On the Influence of the FPGA Compiler Optimization Options on the Success of the Horizontal Attack. ReConFig 2019: 1-5 - [i7]Maksim Jenihhin, Said Hamdioui, Matteo Sonza Reorda, Milos Krstic, Peter Langendörfer, Christian Sauer, Anton Klotz, Michael Hübner, Jörg Nolte, Heinrich Theodor Vierhaus, Georgios N. Selimis, Dan Alexandrescu, Mottaqiallah Taouil, Geert Jan Schrijen, Jaan Raik, Luca Sterpone, Giovanni Squillero, Zoya Dyka:
RESCUE: Interdependent Challenges of Reliability, Security and Quality in Nanoelectronic Systems. CoRR abs/1912.01561 (2019) - 2018
- [j26]Dan Kreiser, Zoya Dyka, Stephan Kornemann, Christian Wittke, Ievgen Kabin, Oliver Stecklina, Peter Langendörfer:
On Wireless Channel Parameters for Key Generation in Industrial Environments. IEEE Access 6: 79010-79025 (2018) - [c87]Ievgen Kabin, Zoya Dyka, Dan Kreiser, Peter Langendörfer:
Unified field multiplier for ECC: Inherent resistance against horizontal SCA attacks. DTIS 2018: 1-4 - [c86]Dan Kreiser, Zoya Dyka, Ievgen Kabin, Peter Langendörfer:
Low-energy key exchange for automation systems. DTIS 2018: 1-5 - [c85]Ievgen Kabin, Zoya Dyka, Dan Kreiser, Peter Langendörfer:
Comments On: Constant Time Modular Inversion. Krypto-Tag 2018 - [c84]Ievgen Kabin, Zoya Dyka, Dan Kreiser, Peter Langendörfer:
Low-Cost Countermeasure against Horizontal Bus and Address-Bit SCA. Krypto-Tag 2018 - [c83]Dan Kreiser, Zoya Dyka, Ievgen Kabin, Peter Langendörfer:
HCCA against Montgomery kP Design. Krypto-Tag 2018 - [c82]Dmytro Petryk, Zoya Dyka, Peter Langendörfer:
Optical Fault Injections: Most Often Used Setups. Krypto-Tag 2018 - [c81]Christian Wittke, Zoya Dyka, Peter Langendörfer:
Placement of Gates in ECC Designs. Krypto-Tag 2018 - [c80]Ievgen Kabin, Zoya Dyka, Dan Kreiser, Peter Langendörfer:
Horizontal Address-Bit DEMA against ECDSA. NTMS 2018: 1-7 - [c79]Zoya Dyka, Dan Kreiser, Ievgen Kabin, Peter Langendörfer:
Flexible FPGA ECDSA Design with a Field Multiplier Inherently Resistant against HCCA. ReConFig 2018: 1-6 - [c78]Ievgen Kabin, Dan Kreiser, Zoya Dyka, Peter Langendörfer:
FPGA Implementation of ECC: Low-Cost Countermeasure against Horizontal Bus and Address-Bit SCA. ReConFig 2018: 1-7 - [c77]Marcin Brzozowski, Max Frohberg, Peter Langendörfer:
Real-World Deployments of Sensor Networks: Practical Lessons for Researchers. WWIC 2018: 42-53 - [i6]Christian Wittke, Ievgen Kabin, Dan Klann, Zoya Dyka, Anton Datsuk, Peter Langendörfer:
Horizontal DEMA Attack as the Criterion to Select the Best Suitable EM Probe. IACR Cryptol. ePrint Arch. 2018: 1181 (2018) - 2017
- [c76]Ievgen Kabin, Zoya Dyka, Dan Kreiser, Peter Langendörfer:
Evaluation of resistance of ECC designs protected by different randomization countermeasures against horizontal DPA attacks. EWDTS 2017: 1-7 - [c75]Ievgen Kabin, Zoya Dyka, Dan Kreiser, Peter Langendörfer:
Methods for Increasing the Resistance of Cryptographic Designs Against Horizontal DPA Attacks. ICICS 2017: 225-235 - [c74]Anna Sojka-Piotrowska, Peter Langendörfer:
Shortening the security parameters in lightweight WSN applications for IoT - lessons learned. PerCom Workshops 2017: 636-641 - [c73]Ievgen Kabin, Zoya Dyka, Dan Kreiser, Peter Langendörfer:
Horizontal address-bit DPA against montgomery kP implementation. ReConFig 2017: 1-8 - 2016
- [j25]Evangelos B. Mazomenos, Dwaipayan Biswas, Andy Cranny, Amal Rajan, Koushik Maharatna, Josy Achner, Jasmin Klemke, Michael Jobges, Steffen Ortmann, Peter Langendörfer:
Detecting Elementary Arm Movements by Tracking Upper Limb Joint Angles With MARG Sensors. IEEE J. Biomed. Health Informatics 20(4): 1088-1099 (2016) - [c72]Zoya Dyka, Estuardo Alpirez Bock, Ievgen Kabin, Peter Langendörfer:
Inherent Resistance of Efficient ECC Designs against SCA Attacks. NTMS 2016: 1-5 - [c71]Christian Wittke, Zoya Dyka, Peter Langendörfer:
Comparison of EM Probes Using SEMA of an ECC Design. NTMS 2016: 1-5 - [c70]Estuardo Alpirez Bock, Zoya Dyka, Peter Langendörfer:
Increasing the Robustness of the Montgomery kP-Algorithm Against SCA by Modifying Its Initialization. SECITC 2016: 167-178 - [c69]Christian Wittke, Zoya Dyka, Oliver Skibitzki, Peter Langendörfer:
Preparation of SCA Attacks: Successfully Decapsulating BGA Packages. SECITC 2016: 240-247 - 2015
- [c68]Marcin Brzozowski, Peter Langendörfer:
Bug-Tolerant Sensor Networks: Experiences from Real-World Applications. ADHOCNETS 2015: 251-262 - [c67]Zoya Dyka, Christian Wittke, Peter Langendörfer:
Clockwise Randomization of the Observable Behaviour of Crypto ASICs to Counter Side Channel Attacks. DSD 2015: 551-554 - [c66]Jens-Matthias Bohli, Antonio F. Skarmeta, M. Victoria Moreno, Dan García-Carrillo, Peter Langendörfer:
SMARTIE project: Secure IoT data management for smart cities. RIoT 2015: 1-6 - [c65]Oliver Stecklina, Peter Langendörfer, Frank Vater, Thorsten Kranz, Gregor Leander:
Intrinsic Code Attestation by Instruction Chaining for Embedded Devices. SecureComm 2015: 97-115 - [i5]Christian Wittke, Zoya Dyka, Peter Langendörfer:
Influence of Electrical Circuits of ECC Designs on Shape of Electromagnetic Traces measured on FPGA. IACR Cryptol. ePrint Arch. 2015: 100 (2015) - [i4]Zoya Dyka, Thomas Basmer, Christian Wittke, Peter Langendörfer:
Individualizing Electrical Circuits of Cryptographic Devices as a Means to Hinder Tampering Attacks. IACR Cryptol. ePrint Arch. 2015: 442 (2015) - 2014
- [j24]Stephan Kornemann, Steffen Ortmann, Peter Langendörfer, Alexandros G. Fragkiadakis:
Enabling Wireless Sensor Nodes for Self-Contained Jamming Detection. J. Cyber Secur. Mobil. 3(2): 133-158 (2014) - [c64]Emmanouela Vogiatzaki, Yannis Gravezas, Nikos Dalezios, Dwaipayan Biswas, Andy Cranny, Steffen Ortmann, Peter Langendörfer, Ilias Lamprinos, Gioula Giannakopoulou, Josy Achner, Jasmin Klemke, Holger Jost:
Telemedicine system for game-based rehabilitation of stroke patients in the FP7-"StrokeBack" project. EuCNC 2014: 1-5 - [c63]Marcin Brzozowski, Peter Langendörfer:
Multi-channel support for preamble sampling MAC protocols in sensor networks. SoftCOM 2014: 149-153 - [i3]Zoya Dyka, Thomas Basmer, Christian Wittke, Peter Langendörfer:
Proposing Individualization of the design of cryptographic hardware accelerators as countermeasure against structure and side channel analysis. IACR Cryptol. ePrint Arch. 2014: 342 (2014) - [i2]Thomas Basmer, Christian Wittke, Zoya Dyka, Peter Langendörfer:
How Different Electrical Circuits of ECC Designs Influence the Shape of Power Traces measured on FPGA. IACR Cryptol. ePrint Arch. 2014: 993 (2014) - 2013
- [j23]Oliver Stecklina, Peter Langendörfer, Christian Goltz:
A Lifetime Forecast Scheme for a Distributed Low Duty Cycle Multi-Hop Routing in Wireless Sensor Networks. Int. J. Bus. Data Commun. Netw. 9(4): 1-22 (2013) - [c62]Marcin Brzozowski, Peter Langendörfer:
Is cross-platform protocol stack suitable for sensor networks? Empirical evaluation. WMNC 2013: 1-8 - [c61]Oliver Stecklina, Peter Langendörfer, Christian Goltz:
A fair energy trade multi-hop routing in wireless sensor networks. WMNC 2013: 1-8 - [c60]Oliver Stecklina, Peter Langendörfer, Hannes Menzel:
Design of a tailor-made memory protection unit for low power microcontrollers. SIES 2013: 225-231 - [c59]Marcin Brzozowski, Peter Langendörfer:
Overview and benchmarks of pragmatic debugging techniques for wireless sensor networks. SoftCOM 2013: 1-5 - [p1]Zoya Dyka, Peter Langendörfer:
Improving the Security of Wireless Sensor Networks by Protecting the Sensor Nodes against Side Channel Attacks. Wireless Networks and Security 2013: 303-328 - 2012
- [j22]Marcin Brzozowski, Hendrik Salomon, Peter Langendörfer:
Support for a Long Lifetime and Short End-to-End Delays with TDMA Protocols in Sensor Networks. Int. J. Distributed Sens. Networks 8 (2012) - [c58]Steffen Ortmann, Peter Langendörfer:
A Telemedicine System for Improved Rehabilitation of Stroke Patients. HEALTHINF 2012: 270-274 - [c57]Zoya Dyka, Christian Walczyk, Damian Walczyk, Christian Wenger, Peter Langendörfer:
Side channel attacks and the non volatile memory of the future. CASES 2012: 13-16 - [c56]Steffen Peter, Peter Langendörfer:
Tool-Supported Methodology for Component-Based Design of Wireless Sensor Network Applications. COMPSAC Workshops 2012: 526-531 - [c55]Dan Kreiser, Marcin Brzozowski, Goran Panic, Sonom Olonbayar, Thomas Basmer, Peter Langendörfer:
The all IHP sensor node: highly integrated sensor nodes using IHP components. MOBIWAC 2012: 147-148 - [c54]Zoya Dyka, Peter Langendörfer, Frank Vater, Steffen Peter:
Towards Strong Security in Embedded and Pervasive Systems: Energy and Area Optimized Serial Polynomial Multipliers in GF(2k). NTMS 2012: 1-6 - [c53]Peter Langendörfer, Krzysztof Piotrowski, Manuel Díaz, Bartolomé Rubio:
Distributed Shared Memory as an Approach for Integrating WSNs and Cloud Computing. NTMS 2012: 1-6 - 2011
- [j21]Xuemin (Sherman) Shen, Jelena V. Misic, Nei Kato, Peter Langendörfer, Xiaodong Lin:
Emerging technologies and applications of wireless communication in healthcare. J. Commun. Networks 13(2): 81-85 (2011) - [j20]Steffen Ortmann, Peter Langendörfer, Stephan Kornemann:
WiSec 2011 demo: demonstrating self-contained on-node counter measures for various jamming attacks in WSN. ACM SIGMOBILE Mob. Comput. Commun. Rev. 15(3): 39-40 (2011) - [c52]Oliver Stecklina, Peter Langendörfer:
Ubiquitous computing asks for ubiquitous line of defense. GI-Jahrestagung 2011: 109 - [c51]Marcin Brzozowski, Hendrik Salomon, Krzysztof Piotrowski, Peter Langendörfer:
Cross-platform protocol development for sensor networks: lessons learned. SESENA@ICSE 2011: 7-12 - [c50]Oliver Stecklina, Peter Langendörfer, Hannes Menzel:
Towards a Secure Address Space Separation for Low Power Sensor Nodes. PECCS 2011: 512-517 - [c49]Anna Sojka, Krzysztof Piotrowski, Peter Langendörfer:
Symbiosis of a Lightweight ECC Security and Distributed Shared Memory Middleware in Wireless Sensor Networks. SRDS Workshops 2011: 36-41 - [c48]Steffen Ortmann, Peter Langendörfer:
The Impact of Social Networks on user Privacy - What Social Networks Really Learn about Their Users! WEBIST 2011: 21-26 - [c47]Zoya Dyka, Peter Langendörfer, Frank Vater:
Combining Multiplication Methods with Optimized Processing Sequence for Polynomial Multiplier in GF(2 k ). WEWoRC 2011: 137-150 - 2010
- [j19]Steffen Ortmann, Michael Maaser, Peter Langendörfer:
Self-Adapting Event Configuration in Ubiquitous Wireless Sensor Networks. Int. J. Adapt. Resilient Auton. Syst. 1(2): 46-63 (2010) - [j18]Jorge Portilla, Andrés Otero, Eduardo de la Torre, Teresa Riesgo, Oliver Stecklina, Steffen Peter, Peter Langendörfer:
Adaptable Security in Wireless Sensor Networks by Using Reconfigurable ECC Hardware Coprocessors. Int. J. Distributed Sens. Networks 6(1) (2010) - [j17]Levente Buttyán, D. Gessner, A. Hessler, Peter Langendörfer:
Application of wireless sensor networks in critical infrastructure protection: challenges and design options. IEEE Wirel. Commun. 17(5): 44-49 (2010) - [c46]Krzysztof Piotrowski, Anna Sojka, Peter Langendörfer:
Body area network for first responders: a case study. BODYNETS 2010: 37-40 - [c45]Marcin Brzozowski, Hendrik Salomon, Peter Langendörfer:
On Efficient Clock Drift Prediction Means and their Applicability to IEEE 802.15.4. EUC 2010: 216-223 - [c44]Marcin Brzozowski, Hendrik Salomon, Peter Langendörfer:
Limiting end-to-end delays in long-lasting sensor networks. MOBIWAC 2010: 11-20 - [c43]Michael Maaser, Peter Langendörfer, Stefan Nowak:
Automated mapping of MAC parameters into generic QoS parameters by Inter-MAC adaptors. PIMRC 2010: 2817-2822 - [c42]Anna Sojka, Krzysztof Piotrowski, Peter Langendörfer:
Short ECC - A Lightweight Security Approach for Wireless Sensor Networks. SECRYPT 2010: 304-308 - [c41]Marcin Brzozowski, Hendrik Salomon, Peter Langendörfer:
ILA: Idle Listening Avoidance in Scheduled Wireless Sensor Networks. WWIC 2010: 363-374
2000 – 2009
- 2009
- [j16]Michael Maaser, Peter Langendörfer:
Privacy from Promises to Protection. Mob. Networks Appl. 14(1): 65-81 (2009) - [c40]António Grilo, Krzysztof Piotrowski, Peter Langendörfer, Augusto Casaca:
A Wireless Sensor Network Architecture for Homeland Security Application. ADHOC-NOW 2009: 397-402 - [c39]Marcin Brzozowski, Hendrik Salomon, Peter Langendörfer:
Completely Distributed Low Duty Cycle Communication for Long-Living Sensor Networks. CSE (2) 2009: 109-116 - [c38]Krzysztof Piotrowski, Peter Langendörfer, Steffen Peter:
tinyDSM: A highly reliable cooperative data storage for Wireless Sensor Networks. CTS 2009: 225-232 - [c37]Steffen Peter, Oliver Stecklina, Peter Langendörfer:
An Engineering Approach for Secure and Safe Wireless Sensor and Actuator Networks for Industrial Automation Systems. ETFA 2009: 1-8 - [c36]Marcin Brzozowski, Krzysztof Piotrowski, Peter Langendörfer:
A cross-layer approach for data replication and gathering in decentralized long-living wireless sensor networks. ISADS 2009: 49-54 - [c35]Steffen Ortmann, Michael Maaser, Peter Langendörfer:
Adaptive pruning of event decision trees for energy efficient collaboration in event-driven WSN. MobiQuitous 2009: 1-11 - [c34]Peter Langendörfer, Frank Vater, Krzysztof Piotrowski:
Customizing sensor nodes and software for individual pervasive health applications. PervasiveHealth 2009: 1-4 - [c33]Torsten Meyer, Peter Langendörfer, Michael Bahr, Vincenzo Suraci, Stefan Nowak, Ralf Jennen:
An Inter-MAC architecture for heterogeneous gigabit home networks. PIMRC 2009: 1-5 - [c32]Marcin Brzozowski, Peter Langendörfer:
On Prolonging Sensornode Gateway Lifetime by Adapting Its Duty Cycle. WWIC 2009: 24-35 - 2008
- [j15]Steffen Ortmann, Peter Langendörfer, Michael Maaser:
Adapting pervasive systems to multiuser privacy requirements. Int. J. Ad Hoc Ubiquitous Comput. 3(4): 264-276 (2008) - [j14]Steffen Peter, Peter Langendörfer, Krzysztof Piotrowski:
Public key cryptography empowered smart dust is affordable. Int. J. Sens. Networks 4(1/2): 130-143 (2008) - [j13]Qusay H. Mahmoud, Peter Langendörfer:
Guest editorial: Service-oriented computing. ACM Trans. Internet Techn. 8(3): 11:1-11:3 (2008) - [c31]Steffen Peter, Krzysztof Piotrowski, Peter Langendörfer:
In-network-aggregation as case study for a support tool reducing the complexity of designing secure wireless sensor networks. LCN 2008: 778-785 - [c30]Peter Langendörfer, Michael Maaser:
Privacy guaranteeing execution containers: one time use of personal data by location based services. MOBILWARE 2008: 18 - [c29]Steffen Ortmann, Peter Langendörfer:
Enhancing reliability of sensor networks by fine tuning their event observation behavior. WOWMOM 2008: 1-6 - [e4]Cherif Branki, Brian Cross, Gregorio Díaz, Peter Langendörfer, Fritz Laux, Guadalupe Ortiz, Martin Randles, A. Taleb-Bendiab, Frank Teuteberg, Rainer Unland, Gerhard Wanner:
Techniques and Applications for Mobile Commerce - Proceedings of TAMoCo 2008, University of Paisley, Glasgow, Scotland, United Kingdom, 14 - 15 January 2008. Frontiers in Artificial Intelligence and Applications 169, IOS Press 2008, ISBN 978-1-58603-826-7 [contents] - [e3]Jarmo Harju, Geert J. Heijenk, Peter Langendörfer, Vasilios A. Siris:
Wired/Wireless Internet Communications, 6th International Conference, WWIC 2008, Tampere, Finland, May 28-30, 2008, Proceedings. Lecture Notes in Computer Science 5031, Springer 2008, ISBN 978-3-540-68805-1 [contents] - 2007
- [j12]Peter Langendörfer, Krzysztof Piotrowski, Steffen Peter, Martin Lehmann:
Crosslayer firewall interaction as a means to provide effective and efficient protection at mobile devices. Comput. Commun. 30(7): 1487-1497 (2007) - [j11]Frank Vater, Peter Langendörfer:
An Area Efficient Realisation of AES for Wireless Devices (Eine flächeneffiziente AES Hardwarerealisierung für drahtlose Geräte). it Inf. Technol. 49(3): 188- (2007) - [c28]Steffen Peter, Krzysztof Piotrowski, Peter Langendörfer:
On Concealed Data Aggregation for WSNs. CCNC 2007: 192-196 - [c27]Steffen Peter, Peter Langendörfer, Krzysztof Piotrowski:
Flexible hardware reduction for elliptic curve cryptography in GF(2m). DATE 2007: 1259-1264 - [c26]Steffen Ortmann, Peter Langendörfer, Michael Maaser:
A self-configuring privacy management architecture for pervasive systems. MOBIWAC 2007: 184-187 - [c25]Steffen Ortmann, Peter Langendörfer, Michael Maaser:
Enhancing Privacy by Applying Information Flow Modelling in Pervasive Systems. OTM Workshops (2) 2007: 794-803 - [c24]Michael Maaser, Steffen Ortmann, Peter Langendörfer:
The Privacy Advocate: Assertion of Privacy by Personalised Contracts. WEBIST (Selected Papers) 2007: 85-97 - [c23]Michael Maaser, Steffen Ortmann, Peter Langendörfer:
The Privacy Advocate (PrivAd) - A Framework for Negotiating Individual Privacy Contracts. WEBIST (1) 2007: 88-95 - [c22]Frank Vater, Steffen Peter, Peter Langendörfer:
Combinatorial Logic Circuitry as Means to Protect Low Cost Devices Against Side Channel Attacks. WISTP 2007: 244-253 - [i1]Zoya Dyka, Peter Langendörfer:
Area Efficient Hardware Implementation of Elliptic Curve Cryptography by Iteratively Applying Karatsuba's Method. CoRR abs/0710.4810 (2007) - 2006
- [j10]Krzysztof Piotrowski, Peter Langendörfer, Oliver Maye, Zoya Dyka:
Protecting privacy in e-cash schemes by securing hidden identity approaches against statistical attacks. Internet Res. 16(2): 159-169 (2006) - [j9]Xuemin Shen, Chuang Lin, Yan Lindsay Sun, Jianping Pan, Peter Langendörfer, Zhenfu Cao:
Wireless network security. Wirel. Commun. Mob. Comput. 6: 269-271 (2006) - [c21]Krzysztof Piotrowski, Peter Langendörfer, Steffen Peter:
How public key cryptography influences wireless sensor node lifetime. SASN 2006: 169-176 - [c20]Peter Langendörfer, Martin Lehmann, Krzysztof Piotrowski:
Efficient Protection of Mobile Devices by Cross Layer Interaction of Firewall Approaches. WWIC 2006: 155-165 - 2005
- [c19]Michael Maaser, Peter Langendörfer:
Automated Negotiation of Privacy Contracts. COMPSAC (1) 2005: 505-510 - [c18]Zoya Dyka, Peter Langendörfer:
Area Efficient Hardware Implementation of Elliptic Curve Cryptography by Iteratively Applying Karatsuba's Method. DATE 2005: 70-75 - [c17]Peter Langendörfer, Krzysztof Piotrowski, Michael Maaser:
Charged Location Aware Services - A Privacy Analysis. ICMB 2005: 116-120 - [c16]Peter Langendörfer, Martin Lehmann:
Implementation Independent Profiling of SDL Specifications. Software Engineering 2005: 155-166 - [c15]Krzysztof Piotrowski, Peter Langendörfer, Michael Maaser, Gregor Spichal, Peter Schwander:
Charged Location Aware Services. Wireless Information Systems 2005: 33-41 - 2004
- [j8]Peter Langendörfer, Vassilios Tsaoussidis:
Protocol engineering for wired and wireless networks. Comput. Commun. 27(10): 907 (2004) - [j7]Peter Langendörfer, Vassilios Tsaoussidis:
Some open issues on internetworking for the next generation. Comput. Commun. 27(10): 908-913 (2004) - [c14]Damian Kulikowski, Peter Langendörfer, Krzysztof Piotrowski:
A location-aware Revocation Approach. GI Jahrestagung (2) 2004: 271-275 - [e2]Peter Langendörfer, Mingyan Liu, Ibrahim Matta, Vassilios Tsaoussidis:
Wired/Wireless Internet Communications, Second International Conference, WWIC 2004, Frankfurt/Oder, Germany, February 4-6, 2004, Proceedings. Lecture Notes in Computer Science 2957, Springer 2004, ISBN 3-540-20954-9 [contents] - 2003
- [c13]Marcel Bennicke, Peter Langendörfer:
Towards automatic negotiation of privacy contracts for Internet services. ICON 2003: 319-324 - 2002
- [j6]Peter Langendörfer:
Editorial Comments. J. Supercomput. 23(3): 223-224 (2002) - [j5]Peter Langendörfer, Michael Methfessel, Horst Frankenfeldt, Irina Babanskaja, Irina Matthaei, Rolf Kraemer:
Shielding TCP from Wireless Link Errors: Retransmission Effort and Fragmentation. J. Supercomput. 23(3): 245-260 (2002) - [j4]Michael Methfessel, Kai F. Dombrowski, Peter Langendörfer, Horst Frankenfeldt, Irina Babanskaja, Irina Matthaei, Rolf Kraemer:
Vertical optimization of data transmission for mobile wireless terminals. IEEE Wirel. Commun. 9(6): 36-43 (2002) - [c12]Peter Langendörfer, Rolf Kraemer:
Towards User Defined Privacy in Location- Aware Platforms. International Conference on Internet Computing 2002: 335-341 - 2001
- [b1]Peter Langendörfer:
Gestaltung konfigurierbarer Codegeneratoren für die automatische Erzeugung effizienter Protokollimplementierungen. Brandenburg University of Technology, Cottbus - Senftenberg, Germany, Shaker 2001, ISBN 978-3-8265-8539-5, pp. 1-162 - [j3]Peter Langendörfer, Rolf Kraemer, Hartmut König:
Evaluation of Well-Known Protocol Implementation Techniques for Application in Wireless Networks. J. Supercomput. 20(2): 161-173 (2001) - [c11]Sven Twarok, Peter Langendörfer, Hartmut König:
Automated Derivation of ILP Implementations from SDL Specifications. FORTE 2001: 3-18 - [c10]Michael Methfessel, Peter Langendörfer, Horst Frankenfeldt, Irina Babanskaja, Irina Matthaei, Rolf Kraemer:
Optimizing the Cooperation Between TCP and Wireless MAC. International Conference on Internet Computing (1) 2001: 339-345 - 2000
- [j2]Hartmut König, Peter Langendörfer, Heiko Krumm:
Improving the efficiency of automated protocol implementations using a configurable FDT compiler. Comput. Commun. 23(12): 1179-1195 (2000) - [c9]Peter Langendörfer, Thomas Krüger, Hartmut König:
Leistungsbewertung von SDL-Spezifikationen - Ein Werkzeug zur Bewertung von Implementierungstechniken. FBT 2000: 143-152 - [c8]Peter Langendörfer, Hartmut König:
Evaluation of Well-Known Protocol Implementation Techniques for Application in Mobile Networks. International Conference on Internet Computing 2000: 451-458
1990 – 1999
- 1999
- [j1]Peter Langendörfer, Hartmut König:
Effiziente Abbildung von SDL-Spezifikationen auf Activity-Threads mittels Transition Reordering. Prax. Inf.verarb. Kommun. 22(4): 197-203 (1999) - [c7]Peter Langendörfer, Hartmut König:
Automatische Generierung effizienter Protokollimplementierungen. FBT 1999: 135-144 - [c6]Peter Langendörfer, Hartmut König:
Deriving Activity Thread Implementations from Formal Descriptions Using Transition Reordering. FORTE 1999: 169-184 - [c5]Peter Langendörfer, Hartmut König:
Automated Protocol Implementations Based on Activity Threads. ICNP 1999: 3-10 - [c4]Peter Langendörfer, Hartmut König:
COCOS - A configurable SDL compiler for generating efficient protocol implementations. SDL Forum 1999: 259-274 - 1998
- [c3]Peter Langendörfer, Thomas Krüger, Sven Twarok:
Eine SDL-Laufzeitumgebung zur Unterstützung unterschiedlicher Implementationsstrategien. FBT 1998: 245-254 - [e1]Hartmut König, Peter Langendörfer:
Formale Beschreibungstechniken für verteilte Systeme, 8. GI/ITG-Fachgespräch, Cottbus, 4. und 5. Juni 1998. Verlag Shaker 1998, ISBN 3-8265-3807-2 [contents] - 1997
- [c2]Peter Langendörfer:
iSDL: Ein Ansatz zur Integration leistungssteigernder Implementierungsvorgaben in SDL'92. FBT 1997: 303-311 - 1996
- [c1]Andreas Mitschele-Thiel, Peter Langendörfer, Ralf Henke:
Design and Optimization of High-Performance Protocols with the DO-IT Toolbox. FORTE 1996: 45-60
Coauthor Index
aka: Marcin J. Aftowicz
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-26 23:43 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint