default search action
Steffen Peter
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2011
- [b1]Steffen Peter:
Tool-supported development of secure wireless sensor networks. Brandenburg University of Technology, 2011, pp. 1-222
Journal Articles
- 2017
- [j12]Hamid Mirzaei Buini, Steffen Peter, Tony Givargis:
Adaptive embedded control of cyber-physical systems using reinforcement learning. IET Cyper-Phys. Syst.: Theory & Appl. 2(3): 127-135 (2017) - 2016
- [j11]Massimo Fornasier, Steffen Peter, Holger Rauhut, Stephan Worm:
Conjugate gradient acceleration of iteratively re-weighted least squares methods. Comput. Optim. Appl. 65(1): 205-259 (2016) - [j10]Steffen Peter, Bhanu Pratap Reddy, Farshad Momtaz, Tony Givargis:
Design of Secure ECG-Based Biometric Authentication in Body Area Sensor Networks. Sensors 16(4): 570 (2016) - [j9]Tom Springer, Steffen Peter, Tony Givargis:
Fuzzy logic based adaptive hierarchical scheduling for periodic real-time tasks. SIGBED Rev. 13(1): 8-14 (2016) - 2015
- [j8]Steffen Peter, Tony Givargis:
Component-Based Synthesis of Embedded Systems Using Satisfiability Modulo Theories. ACM Trans. Design Autom. Electr. Syst. 20(4): 49:1-49:27 (2015) - [j7]Steffen Peter, Marco Artina, Massimo Fornasier:
Damping Noise-Folding and Enhanced Support Recovery in Compressed Sensing. IEEE Trans. Signal Process. 63(22): 5990-6002 (2015) - 2014
- [j6]Volkan Gunes, Steffen Peter, Tony Givargis, Frank Vahid:
A Survey on Concepts, Applications, and Challenges in Cyber-Physical Systems. KSII Trans. Internet Inf. Syst. 8(12): 4242-4268 (2014) - [j5]Tom Springer, Steffen Peter, Tony Givargis:
Adaptive resource synchronization in hierarchical real-time systems. SIGBED Rev. 11(4): 37-42 (2014) - 2010
- [j4]Jorge Portilla, Andrés Otero, Eduardo de la Torre, Teresa Riesgo, Oliver Stecklina, Steffen Peter, Peter Langendörfer:
Adaptable Security in Wireless Sensor Networks by Using Reconfigurable ECC Hardware Coprocessors. Int. J. Distributed Sens. Networks 6(1) (2010) - [j3]Steffen Peter, Dirk Westhoff, Claude Castelluccia:
A Survey on the Encryption of Convergecast Traffic with In-Network Processing. IEEE Trans. Dependable Secur. Comput. 7(1): 20-34 (2010) - 2008
- [j2]Steffen Peter, Peter Langendörfer, Krzysztof Piotrowski:
Public key cryptography empowered smart dust is affordable. Int. J. Sens. Networks 4(1/2): 130-143 (2008) - 2007
- [j1]Peter Langendörfer, Krzysztof Piotrowski, Steffen Peter, Martin Lehmann:
Crosslayer firewall interaction as a means to provide effective and efficient protection at mobile devices. Comput. Commun. 30(7): 1487-1497 (2007)
Conference and Workshop Papers
- 2016
- [c29]Steffen Peter, Tony Givargis:
Towards a timing attack aware high-level synthesis of integrated circuits. ICCD 2016: 452-455 - 2015
- [c28]Hamid Mirzaei Buini, Steffen Peter, Tony Givargis:
Including variability of physical models into the design automation of cyber-physical systems. DAC 2015: 153:1-153:6 - [c27]Tom Springer, Steffen Peter, Tony Givargis:
Fuzzy Logic Based Adaptive Hierarchical Scheduling for Periodic Real-Time Tasks. EWiLi 2015 - [c26]Steffen Peter, Farshad Momtaz, Tony Givargis:
From the browser to the remote physical lab: Programming cyber-physical systems. FIE 2015: 1-7 - [c25]Volkan Gunes, Steffen Peter, Tony Givargis:
Improving Energy Efficiency and Thermal Comfort of Smart Buildings with HVAC Systems in the Presence of Sensor Faults. HPCC/CSS/ICESS 2015: 945-950 - 2014
- [c24]Jana Krimmling, Steffen Peter:
Integration and evaluation of intrusion detection for CoAP in smart city applications. CNS 2014: 73-78 - [c23]Tom Springer, Steffen Peter, Tony Givargis:
Adaptive Resource Synchronization In Hierarchical Real-Time Systems. EWiLi 2014 - [c22]Tom Springer, Steffen Peter, Tony Givargis:
Resource Synchronization in Hierarchically Scheduled Real-Time Systems Using Preemptive Critical Sections. ISORC 2014: 293-300 - [c21]Xin Fan, Steffen Peter, Milos Krstic:
GALS design of ECC against side-channel attacks - A comparative study. PATMOS 2014: 1-6 - 2013
- [c20]Volkan Gunes, Steffen Peter, Tony Givargis:
Modeling and Mitigation of Faults in Cyber-physical Systems with Binary Sensors. CSE 2013: 515-522 - [c19]Steffen Peter, Tony Givargis:
Utilizing Intervals in Component-Based Design of Cyber Physical Systems. CSE 2013: 635-642 - [c18]Michael Methfessel, Stefan Lange, Rolf Kraemer, Mario Zessack, Peter Kollermann, Steffen Peter:
Real-Life Deployment of Bluetooth Scatternets for Wireless Sensor Networks. REALWSN 2013: 43-51 - [c17]Michael Methfessel, Stefan Lange, Rolf Kraemer, Mario Zessack, Steffen Peter:
Self-organized Bluetooth scatternets for wireless sensor networks. SenSys 2013: 77:1-77:2 - [c16]Krzysztof Piotrowski, Steffen Peter:
Sens4U: Wireless sensor network applications for environment monitoring made easy. SESENA 2013: 37-42 - 2012
- [c15]Steffen Peter, Peter Langendörfer:
Tool-Supported Methodology for Component-Based Design of Wireless Sensor Network Applications. COMPSAC Workshops 2012: 526-531 - [c14]Zoya Dyka, Peter Langendörfer, Frank Vater, Steffen Peter:
Towards Strong Security in Embedded and Pervasive Systems: Energy and Area Optimized Serial Polynomial Multipliers in GF(2k). NTMS 2012: 1-6 - [c13]Goran Panic, Thomas Basmer, Schomann Henry, Steffen Peter, Frank Vater, Klaus Tittelbach-Helmrich:
Design of a sensor node crypto processor for IEEE 802.15.4 applications. SoCC 2012: 213-217 - 2011
- [c12]Goran Panic, Thomas Basmer, Oliver Schrape, Steffen Peter, Frank Vater, Klaus Tittelbach-Helmrich:
Sensor node processor for security applications. ICECS 2011: 81-84 - [c11]Michael Methfessel, Steffen Peter, Stefan Lange:
Bluetooth Scatternet Tree Formation for Wireless Sensor Networks. MASS 2011: 789-794 - 2010
- [c10]Oliver Maye, Steffen Peter:
How Key Establishment in Medical Sensor Networks Benefits from Near Field Communication Technology. GreenCom/CPSCom 2010: 566-571 - [c9]Felix Jonathan Oppermann, Steffen Peter:
Inferring Technical Constraints of a Wireless Sensor Network Application from End-User Requirements. MSN 2010: 169-175 - 2009
- [c8]Krzysztof Piotrowski, Peter Langendörfer, Steffen Peter:
tinyDSM: A highly reliable cooperative data storage for Wireless Sensor Networks. CTS 2009: 225-232 - [c7]Steffen Peter, Oliver Stecklina, Peter Langendörfer:
An Engineering Approach for Secure and Safe Wireless Sensor and Actuator Networks for Industrial Automation Systems. ETFA 2009: 1-8 - 2008
- [c6]Steffen Peter, Krzysztof Piotrowski, Peter Langendörfer:
In-network-aggregation as case study for a support tool reducing the complexity of designing secure wireless sensor networks. LCN 2008: 778-785 - [c5]Steffen Peter, Mario Zessack, Frank Vater, Goran Panic, Horst Frankenfeldt, Michael Methfessel:
An Encryption-Enabled Network Protocol Accelerator. WWIC 2008: 79-91 - 2007
- [c4]Steffen Peter, Krzysztof Piotrowski, Peter Langendörfer:
On Concealed Data Aggregation for WSNs. CCNC 2007: 192-196 - [c3]Steffen Peter, Peter Langendörfer, Krzysztof Piotrowski:
Flexible hardware reduction for elliptic curve cryptography in GF(2m). DATE 2007: 1259-1264 - [c2]Frank Vater, Steffen Peter, Peter Langendörfer:
Combinatorial Logic Circuitry as Means to Protect Low Cost Devices Against Side Channel Attacks. WISTP 2007: 244-253 - 2006
- [c1]Krzysztof Piotrowski, Peter Langendörfer, Steffen Peter:
How public key cryptography influences wireless sensor node lifetime. SASN 2006: 169-176
Parts in Books or Collections
- 2022
- [p1]Steffen Peter, Tony Givargis:
Generation and Verification of Timing Attack Resilient Schedules During the High-Level Synthesis of Integrated Circuits. Behavioral Synthesis for Hardware Security 2022: 343-363
Informal and Other Publications
- 2013
- [i1]Marco Artina, Massimo Fornasier, Steffen Peter:
Damping Noise-Folding and Enhanced Support Recovery in Compressed Sensing. CoRR abs/1307.5725 (2013)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-26 18:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint