Steffen Peter
Orcid: 0000-0001-6490-2124
According to our database1,
Steffen Peter
authored at least 41 papers
between 2006 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2022
Generation and Verification of Timing Attack Resilient Schedules During the High-Level Synthesis of Integrated Circuits.
Behavioral Synthesis for Hardware Security, 2022
2017
IET Cyper-Phys. Syst.: Theory & Appl., 2017
2016
SIGBED Rev., 2016
Sensors, 2016
Comput. Optim. Appl., 2016
Proceedings of the 34th IEEE International Conference on Computer Design, 2016
2015
IEEE Trans. Signal Process., 2015
ACM Trans. Design Autom. Electr. Syst., 2015
Improving Energy Efficiency and Thermal Comfort of Smart Buildings with HVAC Systems in the Presence of Sensor Faults.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015
Proceedings of the 2015 IEEE Frontiers in Education Conference, 2015
Including variability of physical models into the design automation of cyber-physical systems.
Proceedings of the 52nd Annual Design Automation Conference, 2015
2014
SIGBED Rev., 2014
KSII Trans. Internet Inf. Syst., 2014
Proceedings of the 24th International Workshop on Power and Timing Modeling, 2014
Resource Synchronization in Hierarchically Scheduled Real-Time Systems Using Preemptive Critical Sections.
Proceedings of the 17th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing, 2014
Integration and evaluation of intrusion detection for CoAP in smart city applications.
Proceedings of the IEEE Conference on Communications and Network Security, 2014
2013
Proceedings of the 4th International Workshop on Software Engineering for Sensor Network Applications, 2013
Proceedings of the 11th ACM Conference on Embedded Network Sensor Systems, 2013
Proceedings of the Real-World Wireless Sensor Networks, 2013
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013
2012
Proceedings of the IEEE 25th International SOC Conference, 2012
Towards Strong Security in Embedded and Pervasive Systems: Energy and Area Optimized Serial Polynomial Multipliers in GF(2k).
Proceedings of the 5th International Conference on New Technologies, 2012
Tool-Supported Methodology for Component-Based Design of Wireless Sensor Network Applications.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference Workshops, 2012
2011
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011
Proceedings of the 18th IEEE International Conference on Electronics, Circuits and Systems, 2011
2010
IEEE Trans. Dependable Secur. Comput., 2010
Adaptable Security in Wireless Sensor Networks by Using Reconfigurable ECC Hardware Coprocessors.
Int. J. Distributed Sens. Networks, 2010
Inferring Technical Constraints of a Wireless Sensor Network Application from End-User Requirements.
Proceedings of the Sixth International Conference on Mobile Ad-hoc and Sensor Networks, 2010
How Key Establishment in Medical Sensor Networks Benefits from Near Field Communication Technology.
Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications, 2010
2009
An Engineering Approach for Secure and Safe Wireless Sensor and Actuator Networks for Industrial Automation Systems.
Proceedings of 12th IEEE International Conference on Emerging Technologies and Factory Automation, 2009
Proceedings of the 2009 International Symposium on Collaborative Technologies and Systems, 2009
2008
Int. J. Sens. Networks, 2008
Proceedings of the Wired/Wireless Internet Communications, 6th International Conference, 2008
In-network-aggregation as case study for a support tool reducing the complexity of designing secure wireless sensor networks.
Proceedings of the LCN 2008, 2008
2007
Crosslayer firewall interaction as a means to provide effective and efficient protection at mobile devices.
Comput. Commun., 2007
Combinatorial Logic Circuitry as Means to Protect Low Cost Devices Against Side Channel Attacks.
Proceedings of the Information Security Theory and Practices. Smart Cards, 2007
Flexible hardware reduction for elliptic curve cryptography in GF(2<i><sup>m</sup></i>).
Proceedings of the 2007 Design, Automation and Test in Europe Conference and Exposition, 2007
Proceedings of the 4th IEEE Consumer Communications and Networking Conference, 2007
2006
Proceedings of the 4th ACM Workshop on Security of ad hoc and Sensor Networks, 2006