Begutachtete Konferenzen und Workshops
Title of publication | First Author | All Authors | Substatus | Conference |
The ForTune Toolbox: Building Solutions for Condition-Based and Predictive Maintenance Focusing on Retrofitting | M. Assafo | M. Lautsch, P. Suawa, M. Jongmanns, M.Huebner, M. Reichenbach, C. Brockmann, D. Reinhardt, P. Langendörfer | peer-rev. contr. to collective work | Proc. 10. MikroSystemTechnik Kongress (MST 2023), 541 (2023) |
Crest Factor Oriented Finite Set Model Predictive Control of the Mesh Microgrid | M. Krysik | K. Piotrowski | peer-rev. contr. to collective work | Proc. International Conference on Power and Renewable Energy Engineering (PREE 2023), 174 (2023) |
SmartDSM: Towards User-Centric IoT Middleware Platform for Privacy-Focused Smart Systems | I. Koropiecki | K. Piotrowski | peer-rev. contr. to collective work | Proc. IEEE International Conference on Internet of Things and Intelligence System (IoTaIS 2023), 79 (2023) |
Vulnerability of Atomic Patterns to Simple SCA | I. Kabin | P. Langendörfer, Z. Dyka | peer-rev. contr. to collective work | Proc. 19th IEEE East-West Design & Test Symposium (EWDTS 2023), (2023) |
Concept for Building Edge Devices Application Using the AI4U Approach | K. Woloszyn | K. Piotrowski | peer-rev. contr. to collective work | Proc. 20th GI/ITG KuVS Fachgespräch Sensornetze (FGSN 2023), (2023) |
Household Digital Twin to Support Energy Management and Smart Appliance Research | I. Koropiecki | K. Piotrowski | peer-rev. contr. to collective work | Proc. IEEE International Conference on Smart Grid Communications (SmartGridComm 2023), (2023) |
Distributed Energy Generators as SmartGrid Sensor Network Application | M. Krysik | K. Piotrowski | peer-rev. contr. to collective work | Proc. 20th GI/ITG KuVS Fachgespräch Sensornetze (FGSN 2023), (2023) |
Towards the Optimal Sensors for WSN Applications: Effective Rainfall Monitoring | P. Zielony | K. Piotrowski | peer-rev. contr. to collective work | Proc. 20th GI/ITG KuVS Fachgespräch Sensornetze (FGSN 2023), (2023) |
Addressing the Complexity of Developing AI-based Applications for Low-Power Sensor Nodes | K. Turchan | K. Piotrowski | peer-rev. contr. to collective work | Proc. 20th GI/ITG KuVS Fachgespräch Sensornetze (FGSN 2023), (2023) |
Impact of EU Regulations on Multi-Hop Wireless Sensor Networks | J. Maj | K. Piotrowski | peer-rev. contr. to collective work | Proc. 20th GI/ITG KuVS Fachgespräch Sensornetze (FGSN 2023), (2023) |
Environment Monitoring Backend and Dashboard | I. Koropiecki | K. Piotrowski | peer-rev. contr. to collective work | Proc. 20th GI/ITG KuVS Fachgespräch Sensornetze (FGSN 2023), (2023) |
Modular Platform for Teaching Robotics | D. Nagajek | M. Rapala, K. Woloszyn, K. Turchan, K. Piotrowski | peer-rev. contr. to collective work | Proc. 10th Machine Intelligence and Digital Interaction (MIDI 2022), in: Lecture Notes in Networks and Systems, Springer, LNNS 710, 167 (2023) |
AI4U: Modular Framework for AI Application Design | K. Woloszyn | K. Turchan, M. Rapala, K. Piotrowski | peer-rev. contr. to collective work | Proc. 10th Machine Intelligence and Digital Interaction (MIDI 2022), in: Lecture Notes in Networks and Systems, Springer, LNNS 710, 56 (2023) |
Secure Multi-Hop Telemetry Broadcasts for UAV Swarm Communication | R. Rotta | P. Mykytyn | peer-rev. contr. to collective work | Proc. 20th GI/ITG KuVS Fachgespräch Sensornetze (FGSN 2023), (2023) |
Machine Learning based Real Time Detection of Freezing of Gait of Parkinson Patients Running on a Body Worn Device | A. Haddadi Esfahani | O. Maye, M. Frohberg, M. Speh, M. Jöbges, P. Langendörfer | peer-rev. contr. to collective work | Proc. IEEE/ACM international conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE 2023), 181 (2023) |
No Attacks Are Available: Securing the OpenPLC and Related Systems | W. Alsabbagh | C. Kim, P. Langendörfer | peer-rev. contr. to collective work | Proc. 8th GI/ACM Workshop on Industrial Automation and Control Systems (IACS WS 2023), 2085 (2023) |
Successful Simple Side Channel Analysis: Vulnerability of an Atomic Pattern kP Algorithm Implemented with a Constant Time Crypto Library to Simple Electromagnetic Analysis Attacks | A.A. Sigourou | I. Kabin, P. Langendörfer, N. Sklavos, Z. Dyka | peer-rev. contr. to collective work | Proc. 12th Mediterranean Conference on Embedded Computing (MECO 2023), 167 (2023) |
Randomized Addressing Countermeasures are Inefficient against Address-Bit SCA | I. Kabin | Z. Dyka, P. Langendörfer | peer-rev. contr. to collective work | Proc. IEEE International Conference on Cyber Security and Resilience (CSR 2023), 580 (2023) |
Non-Profiled Semi-Supervised Horizontal Attack Against Elliptic Curve Scalar Multiplication using Support Vector Machines | M. Aftowicz | I. Kabin, Z. Dyka, P. Langendörfer | peer-rev. contr. to collective work | Proc. 26th Euromicro Conference Series on Digital System Design (DSD 2023), 708 (2023) |
Good Night, and Good Luck: A Control Logic Injection Attack on OpenPLC | W. Alsabbagh | C. Kim, P. Langendörfer | peer-rev. contr. to collective work | Proc. 49th Annual Conference of the IEEE Industrial Electronics Society (IECON 2023), (2023) |
A Modular Communication Architecture for Adaptive UAV Swarms | K. Shahin | R. Rotta, O. Archila, P. Mykytyn, M. Nattke, M. Reichenbach, J. Nolte, R. Natarov | peer-rev. contr. to collective work | Proc. IEEE International Conference on Omni Layer Intelligent Systems (COINS 2023), (2023) |
Coarse-Grained Control Flow Integrity Check for Processors with Sliding Register Windows | K. Lehniger | M. Aftowicz, M. Schölzel, P. Langendörfer | peer-rev. contr. to collective work | Proc. 12th Mediterranean Conference on Embedded Computing (MECO 2023), 205 (2023) |
GPS-Spoofing Attack Detection Mechanism for UAV Swarms | P. Mykytyn | M. Brzozowski, Z. Dyka, P. Langendörfer | peer-rev. contr. to collective work | Proc. 11th International Conference on Cyber-Physical Systems and Internet-of-Things (CPS&IoT 2023), 18 (2023) |
Novel Approach to a Plant Inspired Distributed Security Scheme for Wireless Sensor Networks | B. Förster | P. Langendörfer, T. Hinze | peer-rev. contr. to collective work | Proc. 12th Mediterranean Conference on Embedded Computing (MECO 2023), 353 (2023) |
You Are What You Attack: Breaking the Cryptographically-Protected S7 Protocol | W. Alsabbagh | P. Langendörfer | peer-rev. contr. to collective work | Proc. 19th IEEE International Conference on Factory Communication Systems (WFCS 2023), (2023) |
On the Feasibility of Single-Trace Attacks on the Gaussian Sampler using a CDT | S. Marzougui | I. Kabin, J. Krämer, T. Aulbach, J.-P. Seifert | peer-rev. contr. to collective work | Proc. International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2023), in: Lecture Notes in Computer Science, Springer, LNCS 13979, 149 (2023) |
Determining Distributions of Security Means for Wireless Sensor Networks based on the Model of a Neighbourhood Watch | B. Förster | P. Langendörfer, T. Hinze | only online Publication (Web) | zu finden unter: arxiv.org/abs/2212.09050 |
A Stealthy False Command Injection Attack on Modbus based SCADA Systems | W. Alsabbagh | S. Amogbonjaye, D. Urrego, P. Langendörfer | peer-rev. contr. to collective work | Proc. 5th International Workshop on Security Trust Privacy for Cyber-Physical Systems (STP-CPS 2023), (2023) |
Information Security: The Cornerstone for Surviving the Digital Wild | P. Langendörfer | St. Kornemann, W. Alsabbagh, E. Hermann | contributions to collective work | The Future of Smart Production for SMEs, 1st Edition, Editors: O. Madsen, U. Berger, C. Moller, A. Heidemann Lassen, B. Vejrum Waehrens, C. Schou, Chapter. Information Security: The Cornerstone for Surviving the Digital Wild, Springer, 335 (2023) |
Title of publication | First Author | All Authors | Substatus | Conference |
Information Security: The Cornerstone for Surviving the Digital Wild | P. Langendörfer | S. Kornemann, W. Alsabbagh, E. Hermann | peer-rev. contr. to collective work | The Future of Smart Production for SMEs, Berlin Springer, 335 (2022), Germany |
Graphical User Interface in the SmartRiver System | R. Szulim | P. Powroznik, E. Michta, K. Piotrowski, I. Koropiecki | peer-rev. contr. to collective work | Proc. 14th Konferencja Naukowa Systemy Pomiarowe w badaniach naukowych i w przemysle (SP 2022), 97 (2022) |
Zastosowanie Technologii Reflektometrii w Dziedzinie Czasu do Badan Parametrow Gruntow | R. Rybski | T. Frygiel, J. Kostecki, K. Piotrowski | peer-rev. contr. to collective work | Proc. 14th Konferencja Naukowa Systemy Pomiarowe w badaniach naukowych i w przemysle (SP 2022), 85 (2022) |
System do Zdalnego Monitorowania Stanu Walu Przeciwpowodziowego nad Odra | L. Macioszek | N. Lukaniszyn, R. Rybski, J. Kostecki, U. Kolodziejczyk, K. Piotrowski | peer-rev. contr. to collective work | Proc. 14th Konferencja Naukowa Systemy Pomiarowe w badaniach naukowych i w przemysle (SP 2022), 57 (2022) |
Low Voltage Warning System for Stand-Alone Metering Station using AI on the Edge | K. Turchan | K. Piotrowski | peer-rev. contr. to collective work | Proc. 9th Machine Intelligence and Digital Interaction (MIDI 2021), in: Lecture Notes in Networks and Systems, Springer, LNNS 440, 107 (2022) |
Emulation as a Means to Evaluate Energy Management Algorithms | K. Turchan | K. Piotrowski, M. Krysik, I. Koropiecki, P. Powroznik | peer-rev. contr. to collective work | Proc. 14th Konferencja Naukowa Systemy Pomiarowe w badaniach naukowych i w przemyśle (SP 2022), 105 (2022) |
Efficient and Flexible Intelligence on the Edge | K. Turchan | K. Piotrowski, E. Michta | peer-rev. contr. to collective work | Proc. 14th Konferencja Naukowa Systemy Pomiarowe w badaniach naukowych i w przemyśle (SP 2022), 109 (2022) |
Modular AI Applications Followinfg the Sens4u Approach | K. Woloszyn | K. Piotrowski, E. Michta | peer-rev. contr. to collective work | Proc. 14th Konferencja Naukowa Systemy Pomiarowe w badaniach naukowych i w przemyśle (SP 2022), 117 (2022) |
Tinydsm: Data-Oriented Middleware for Low-Power IOT Devices | P. Zielony | K. Piotrowski, E. Michta | peer-rev. contr. to collective work | Proc. 14th Konferencja Naukowa Systemy Pomiarowe w badaniach naukowych i w przemyśle (SP 2022), 121 (2022) |
Idea of Monitoring Internal Processes of Distributed Solar Inverters | M. Krysik | K. Piotrowski, R. Rybski | peer-rev. contr. to collective work | Proc. 14th Konferencja Naukowa Systemy Pomiarowe w badaniach naukowych i w przemyśle (SP 2022), 49 (2022) |
Kangaroo: Multi-Hop Protocol Stack for Smart City Sensor Networks | J. Maj | K. Piotrowski, E. Michta | peer-rev. contr. to collective work | Proc. 14th Konferencja Naukowa Systemy Pomiarowe w badaniach naukowych i w przemyśle (SP 2022), 61 (2022) |
No Need to be Online to Attack - Exploiting S7-1500 PLCs by Time-Of-Day Block | W. Alsabbagh | P. Langendörfer | peer-rev. contr. to collective work | Proc. 28th International Conference on Information, Communication and Automation Technologies (ICAT 2022), (2022) |
Combination of ROP Defense Mechanisms for Better Safety and Security in Embedded Systems | K. Lehniger | M. Schölzel, J. Jelonek, M. Aftowicz, P. Langendörfer | peer-rev. contr. to collective work | Proc. Euromicro Conference on Digital Systems Design (DSD 2022), 480 (2022) |
SmartDSM: Data Space Middleware for Distributed Measurement Systems | I. Koropiecki | K. Piotrowski, R. Szulim | peer-rev. contr. to collective work | Proc. 14th Konferencja Naukowa Systemy Pomiarowe w badaniach naukowych i w przemyśle (SP 2022), 37 (2022) |
Distributed Artificial Intelligence as a Means to Achieve Self-X-Functions for Increasing Resilience: the First Steps | O. Shamilyan | I. Kabin, Z. Dyka, P. Langendoerfer | peer-rev. contr. to collective work | Proc. International Conference on Cyber-Physical Systems and Internet-of-Things (CPS & IoT 2022), 34 (2022) |
Code Mutation as a Mean Against ROP Attacks for Embedded Systems | P. Tabatt | J. Jelonek, M. Schölzel, K. Lehniger, P. Langendörfer | peer-rev. contr. to collective work | Proc. 11th Mediterranean Conference on Embedded Computing (MECO 2022), 189 (2022) |
Scalable FPGA Hardware Accelerator for SVM Inference | M. Aftowicz | K. Lehniger, P. Langendörfer | peer-rev. contr. to collective work | Proc. 10th International Conference on Cyber-Physical Systems and Internet-of-Things (CPS&IoT 2022), 44 (2022) |
Return-Oriented Programming Gadget Catalog for the Xtensa Architecture | B. Amatov | K. Lehniger, P. Langendörfer | peer-rev. contr. to collective work | Proc. 6th International Workshop on Security, Privacy and Trust in the Internet of Things (SPT-IoT), 655 (2022) |
FPGA-based Realtime detection of Freezing of Gait of Parkinson Patients | P. Langer | A. Haddadi Esfahani, Z. Dyka, P. Langendörfer | peer-rev. contr. to collective work | Proc. 16th EAI International Conference on Body Area Networks (BODYNETS 2021), in: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Springer, LNICST 420, 101 (2022) |
Title of publication | First Author | All Authors | Substatus | Conference |
EC Scalar Multiplication: Successful Simple Address-Bit SCA Attack against Atomic Patterns | I. Kabin | Z. Dyka, D. Klann, P. Langendörfer | peer-rev. contr. to collective work | Proc. 22nd IEEE Latin-American Test Symposium (LATS 2021), (2021) |
Simulation of Electromagnetic Emanation of Cryptographic ICs: Tools, Methods, Problems | A. Sosa | Z. Dyka, I. Kabin, P. Langendörfer | peer-rev. contr. to collective work | Proc. 19th IEEE East-West Design & Test Symposium (EWDTS 2021), 12 (2021) |
Cryptographic ICs: Simulation of Electromagnetic Radiation | A. Sosa | Z. Dyka, I. Kabin, P. Langendörfer | contributions to collective work | Proc. 33rd Crypto-Day Matters 2021, (2021) |
Ensuring a Secure Communication Between a GCS and a UAV via the MAVlink Protocol | P. Mykytyn | I. Kabin, Z. Dyka, P. Langendörfer | contributions to collective work | Proc. 33rd Crypto-Day Matters 2021, (2021) |
Optical Fault Injection Attacks: Single-Mode versus Multi-Mode Laser | D. Petryk | Z. Dyka, P. Langendörfer | contributions to collective work | Proc. 33rd Crypto-Day Matters 2021, (2021) |
Incremental Code Updates Exploitation as a Basis for Return Oriented Programming Attacks on Resource-Constrained Devices | A. Saad | K. Lehniger, P. Langendörfer | peer-rev. contr. to collective work | Proc. 5th Cyber Security in Networking Conference (CSNet 2021), (2021) |
A Control Injection Attack against S7 PLCs - Manipulating the Decompiled Code | W. Alsabbagh | P. Langendörfer | peer-rev. contr. to collective work | Proc. 47th Annual Conference of the IEEE Industrial Electronics Society (IECON 2021), (2021) |
Immunität eingebetteter verteilter Systeme gegen ROP-Angriffe durch Mutationen | P. Tabatt | M. Schölzel, K. Lehniger | peer-rev. contr. to collective work | Proc. 33. GI/GMM/ITG-Workshop Testmethoden und Zuverlässigkeit von Schaltungen und Systemen (TuZ 2021), 45 (2021) |
EC P-256: Successful Simple Power Analysis | I. Kabin | Z. Dyka, D. Klann, P. Langendörfer | only online Publication (Web) | zu finden unter: arxiv.org/abs/2106.12321 |
Resilience in the Cyber World: Definitions, Features and Models | E. Vogel | Z. Dyka, D. Klann, P. Langendörfer | only online Publication (Web) | zu finden unter: arxiv.org/abs/2105.10235 |
Optical Fault Injection Attacks against Radiation-Hard Registers | D. Petryk | Z. Dyka, R. Sorge, J. Schäffner, P. Langendörfer | peer-rev. contr. to collective work | Proc. 24th EUROMICRO Conference on Digital System Design (DSD 2021), Special Session: Architectures and Hardware for Security Applications (AHSA), 371 (2021) |
Fast Dual-Field ECDSA Accelerator with Increased Resistance against Horizontal SCA Attacks | I. Kabin | D. Klann, Z. Dyka, P. Langendörfer | peer-rev. contr. to collective work | Proc. IEEE International Conference on Cyber Security and Resilience (CSR 2021), 273 (2021) |
Octopuses: Biological Facts and Technical Solutions | O. Shamilyan | I. Kabin, Z. Dyka, M. Kuba, P. Langendörfer | peer-rev. contr. to collective work | Proc. 9th International Conference on Cyber-Physical Systems and Internet-of-Things (CPS&IoT 2021), 91 (2021) |
Jamming Detection for IR-UWB Ranging Technology in Autonomous UAV Swarms | P. Mykytyn | M. Brzozowski, Z. Dyka, P. Langendörfer | peer-rev. contr. to collective work | Proc. 9th International Conference on Cyber-Physical Systems and Internet-of-Things (CPSIoT 2021), 81 (2021) |
Multiplier as a Mean for Reducing Vulnerability of Atomic Patterns to Horizontal Address-Bit Attacks | Z. Dyka | I. Kabin, D. Klann, P. Langendörfer | peer-rev. contr. to collective work | Proc. 10th Mediterranean Conference on Embedded Computing (MECO 2021), 183 (2021) |
Clustering versus Statistical Analysis for SCA: When Machine Learning is Better | M. Aftowicz | I. Kabin, Z. Dyka, P. Langendörfer | peer-rev. contr. to collective work | Proc. 10th Mediterranean Conference on Embedded Computing (MECO 2021), 174 (2021) |
A Fully-Blind False Data Injection on PROFINET I/O Systems | W. Alsabbagh | P. Langendörfer | peer-rev. contr. to collective work | Proc. 30th International Symposium on Industrial Electronics (ISIE 2021), (2021) |
A Framework to Support Creation of AI Applications for Low-Power WSN Nodes | K. Turchan | K. Piotrowski | peer-rev. contr. to collective work | Proc. 8th Machine Intelligence and Digital Interaction (MIDI 2020), in: Advances in Intelligent Systems and Computing, Springer, AISC 1376, 73 (2021) |
Patch Now and Attack Later - Exploiting S7 PLCs by Time-Of-Day Block | W. Alsabbagh | P. Langendörfer | peer-rev. contr. to collective work | Proc. 4th IEEE International Conference on Industrial Cyber-Physical Systems (ICPS 2021), 144 (2021) |
Radiation Hardness Does Not Mean Tamper Resistance | D. Petryk | Z. Dyka, P. Langendörfer | peer-rev. contr. to collective work | Proc. Design, Automation and Test in Europe Conference (DATE 2021), Workshop on Interdependent Challenges of Reliability, Security and Quality (RESCUE 2021), (2021) |
Breaking of an Open Source Fully Balanced Elliptic Curve Design using Automated Simple SCA | I. Kabin | Z. Dyka, D. Klann, P. Langendörfer | contributions to collective work | Proc. 32nd Crypto-Day Matters 2021, (2021) |
Efficient Implementation of Unified ECC Accelerators based on the Karatsuba Multiplication Method | D. Klann | I. Kabin, Z. Dyka, P. Langendörfer | contributions to collective work | Proc. 32nd Crypto-Day Matters 2021, (2021) |
Extended Horizontal SCA Attack using Clustering Algorithm | M. Aftowicz | D. Klann, I. Kabin, Z. Dyka, P. Langendörfer | contributions to collective work | Proc. 32nd Crypto Day Matters 2021, (2021) |
Laser Fault Injection Attacks against IHP Chips | D. Petryk | Z. Dyka, P. Langendörfer | contributions to collective work | Proc. 32nd Crypto-Day Matters 2021, (2021) |
Simplified Control Flow Integrity Method for Permutated Programs | K. Lehniger | M. Schölzel, P. Tabatt, M. Aftowicz, P. Langendörfer | contributions to collective work | Proc. 32nd Crypto-Day Matters 2021, (2021) |
Generic Energy Production Model for Smart Grid Emulation | M. Krysik | K. Piotrowski, R. Rybski | contributions to collective work | Measurement Systems in Theory and Practice, 1st Edition, Editor: R. Rybski, Generic Energy Production Model for Smart Grid Emulation, Verlag der Universität Zielona Góra, 11 (2021) |
Flood Embankments Monitoring System in On-Line Mode | E. Michta | P. Powroznik, R. Rybski, R. Szulim, K. Piotrowski, U. Kolodziejczyk, J. Kostecki | contributions to collective work | Measurement Systems in Theory and Practice, 1st Edition, Editor: R. Rybski, Flood Embankments Monitoring System in On-Line Mode, Verlag der Universität Zielona Góra, 1 (2021) |
A Stealth Program Injection Attack against S7-300 PLCs | W. Alsabbagh | P. Langendörfer | peer-rev. contr. to collective work | Proc. 22nd International Conference on Industrial Technology (ICIT 2021), 986 (2021) |
Challenges in Developing a Wireless Sensor Network for an Agricultural Monitoring and Decision System | M. Frohberg | St. Weidling, P. Langendörfer | peer-rev. contr. to collective work | Proc. 12th International Networking Conference (INC 2020), in: Selected Papers from the 12th International Networking Conference, Springer, LNNS 180, 224 (2021) |
FFT based Horizontal SCA Attack against ECC | I. Kabin | Z. Dyka, D. Klann, M. Aftowicz, P. Langendörfer | peer-rev. contr. to collective work | Proc. 11th IFIP International Conference on New Technologies, Mobility & Security (NTMS 2021), (2021) |
Leibniz Strategic Forum on Digital Change | St. Ortmann | I. Peters, F. Macgilchrist | only online Publication (Web) | Leibniz Strategic Forum on Digital Change (2021) |
I. Kabin, A. Sosa, Z. Dyka, D. Klann, P. Langendörfer: "On the Influence of the FPGA Compiler Optimization Options on the Success of the Horizontal Attack", Proc. International Conference on Reconfigurable Computing and FPGAs (ReConFig 2019), (2020)
M. Jenihhin, S. Hamdioui, M. Sonza Reorda, M. Krstic, P. Langendörfer, C. Sauer, A. Klotz, M. Huebner, J. Nolte, H.T. Vierhaus, G. Selimis, D. Alexandrescu, M. Taouil, G.J. Schrijen, J. Raik, L. Sterpone, G. Squillero, Z. Dyka: "RESCUE: Interdependent Challenges of Reliability, Security and Quality in Nanoelectronic Systems", Proc. Design, Automation & Test in Europe (DATE 2020), 388 (2020)
I. Kabin, Z. Dyka, M. Aftowicz, D. Klann, P. Langendörfer: "Resistance of the Montgomery kP Algorithm against Simple SCA: Theory and Practice", Proc. 21st IEEE Latin-American Test Symposium (LATS 2020), (2020)
D. Klann, M. Aftowicz, I. Kabin, Z. Dyka, P. Langendörfer: "Integration and Implementation of Four Different Elliptic Curves in a Single High-Speed Design Considering SCA", Proc. 15th IEEE International Conference on Design & Technology of Integrated Systems in Nanoscale Era (DTIS 2020), (2020)
M. Aftowicz, I. Kabin, D. Klann, Y. Varabei, Z. Dyka, P. Langendörfer: "Horizontal SCA Attacks against kP Algorithm using K-Means and PCA", Proc. 8th International Conference on Cyber-Physical Systems and Internet-of-Things (CPS & IoT 2020), 109 (2020)
I. Kabin, Z. Dyka, D. Klann, P. Langendörfer: "Horizontal Attacks against ECC: From Simulations to ASIC", Proc. International Workshop on Information & Operational Technology (IT & OT) Security Systems (IOSec 2019), in: Computer Security, Springer, LNCS 11981, 64 (2020)
D. Petryk, Z. Dyka, P. Langendörfer: "Sensitivity of Standard Library Cells to Optical Fault Injection Attacks in IHP 250 nm Technology", Proc. 9th Mediterranean Conference on Embedded Computing (MECO 2020), 133 (2020)
R. Natarov, O. Sudakov, Z. Dyka, I. Kabin, O. Maksymyuk, O. Iegorova, O. Krishtal, P. Langendörfer: "Resilience Aspects in Distributed Wireless Electroencephalographic Sampling", Proc. 8th International Conference on Cyber-Physical Systems and Internet-of-Things (CPS & IoT 2020), 116 (2020)
D. Petryk, Z. Dyka, E. Perez, M.K. Mahadevaiah, I. Kabin, Ch. Wenger, P. Langendörfer: "Evaluation of the Sensitivity of RRAM Cells to Optical Fault Injection Attacks", Proc. 23rd EUROMICRO Conference on Digital System Design (DSD 2020), Special Session: Architecture and Hardware for Security Applications (AHSA), 238 (2020)
Z. Dyka, E. Vogel, I. Kabin, D. Klann, O. Shamilyan, P. Langendörfer: "No Resilience without Security", Proc. 8th International Conference on Cyber-Physical Systems and Internet-of-Things (CPS & IoT 2020), 83 (2020)
I. Kabin, Z. Dyka, P. Langendörfer: "Automated Simple Analysis Attack", Proc. 8th International Conference on Cyber-Physical Systems and Internet-of-Things (CPS & IoT 2020), 214 (2020)
R. Natarov, Z. Dyka, R. Bohovyk, M. Fedoriuk, D. Isaev, O. Sudakov, O. Maximyuk, O. Krishtal, P. Langendörfer: "Artefacts in EEG Signals Epileptic Seizure Prediction using Edge Devices", Proc. 8th International Conference on Cyber-Physical Systems and Internet-of-Things (CPS & IoT 2020), 768 (2020)
K. Lehniger, M. Aftowicz, P. Langendörfer, Z. Dyka: "Challenges of Return-Oriented-Programming on the Xtensa Hardware Architecture", Proc. 23rd EUROMICRO Conference on Digital System Design (DSD 2020), 154 (2020)
I. Kabin, Z. Dyka, D. Klann, N. Mentens, L. Batina, P. Langendörfer: "Breaking a Fully Balanced ASIC Coprocessor Implementing Complete Addition Formulas on Weierstrass ", Proc. 23rd EUROMICRO Conference on Digital System Design (DSD 2020), Special Session: Architectures and Hardware for Security Applications (AHSA), 270 (2020)
Ch. Martin, P. Langendörfer, P.S. Zarrin, M. Díaz, B. Rubio: "Kafka-ML: Connecting the Data Stream with ML/AI Frameworks", https://arxiv.org/abs/2006.04105
M. Brzozowski, P. Langendörfer: "Bonded Wireless Networks: The Gateway to Real-Time Mobile Applications", Proc. 28th International Conference on Software, Telecommunications and Computer Networks (SoftCOM 2020), (2020)
R. Kovtun, S. Radchenko, A. Netreba, O. Sudakov, R. Natarov, Z. Dyka, I. Kabin, P. Langendörfer: "Exploiting EEG Signals for Eye Motion Tracking", Proc. 18th IEEE East-West Design & Test Symposium (EWDTS 2020), 120 (2020)
D. Petryk, Z. Dyka, J. Katzer, P. Langendörfer: "Metal Fillers as Potential Low Cost Countermeasure against Optical Fault Injection Attacks", Proc. 18th IEEE East-West Design & Test Symposium (EWDTS 2020), 125 (2020)
M. Frohberg, P. Langendörfer: "Demonstration of WISDOM - A Wireless in Field Measurement and Debugging Platform for Wireless Sensor Networks and Devices", Proc. 9th Mediterranean Conference on Embedded Computing (MECO 2020), 911 (2020)
A. Ilic, P. Langendörfer, St. Weidling, M. Schölzel: "Determining Optimal Parallel Schedules in Tree-Based WSNs Using a Realistic Interference Model", Proc. 5th International Congress on Information and Communication Technology (ICICT 2020), in: Advances in Intelligent Systems and Computing, Springer, 1183, 572 (2020)
I. Kabin, Z. Dyka, D. Klann, P. Langendörfer: "Horizontal DPA Attacks against ECC: Impact of Implemented Field Multiplication Formula", Proc. 14th IEEE International Conference on Design & Technology of Integrated Systems in Nanoscale Era (DTIS 2019), (2019)
I. Kabin, Z. Dyka, D. Klann, P. Langendörfer: "Horizontal DPA Attacks against ECC: Impact of Implemented Field Multiplication Formula", Proc. 14th IEEE International Conference on Design & Technology of Integrated Systems in Nanoscale Era (DTIS 2019), (2019)
I. Kabin, M. Aftowicz, D. Klann, Y. Varabei, Z. Dyka, D. Klann, P. Langendörfer: "Horizontal SCA Attack using Machine Learning Algorithms", Proc. 30th Crypto Day Matters 2019, (2019)
I. Kabin, Z. Dyka, D. Klann, P. Langendörfer: "ECC Based Secure Authentication Solutions", Proc. 30th Crypto Day Matters 2019, (2019)
Z. Dyka, E. Vogel, I. Kabin, M. Aftowicz, D. Klann, P. Langendörfer: "Resilience more than the Sum of Security and Dependability: Cognition is what makes the Difference", Proc. 8th Mediterranean Conference on Embedded Computing (MECO 2019), 23 (2019)
Y. Varabei, I. Kabin, Z. Dyka, D. Klann, P. Langendörfer: "Intelligent Clustering as a Means to Improve K-Means Based Horizontal Attacks", Proc. 30th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 2019) Workshop-W6: Machine Learning for Security and Cryptography, (2019)
Z. Dyka, I. Kabin, D. Klann, F. Vater, P. Langendörfer: "Caution: GALS-Ification as a Means against SCA Attacks", Proc. 17th IEEE East-West Design & Test Symposium (EWDTS 2019), 97 (2019)
Z. Dyka, I. Kabin, P. Langendörfer: "Researching Resilience a Holistic Approach", Proc. 17th IEEE East-West Design & Test Symposium (EWDTS 2019), 88 (2019)
I. Kabin, Z. Dyka, D. Klann, P. Langendörfer: "Fast and Secure Unified Field Multiplier for ECC Based on the 4-Segment Karatsuba Multiplication", Proc. 17th IEEE East-West Design & Test Symposium (EWDTS 2019), 320 (2019)
Z. Dyka, I. Kabin, D. Klann, P. Langendörfer: "Engineering of Resilient Crypto-Hardware: Balancing between FI and SCA Resistance", Proc. 22nd EUROMICRO Conference on Digital System Design and Software Engineering and Advanced Applications - Session on Work in Progress (Euromicro DSD & SEAA 2019), (2019)
I. Kabin, Z. Dyka, D. Klann, P. Langendörfer: "Influence of Synopsys Design Compiler Options on the Success of Horizontal DPA Attacks", Proc. 22nd EUROMICRO Conference on Digital System Design and Software Engineering and Advanced Applications - Session on Work in Progress (Euromicro DSD & SEAA 2019), (2019)
C.C. Gürsoy, G. Medeiros, J.-C. Chen, N. George, J.E. Rodriguez Condia, T. Lange, A. Damljanovic, A. Balakrishnan, R. Segabinazzi Ferreira, X. Lai, S. Masoumian, D. Petryk, T. Koylu, F. da Silva, A. Bagbaba, S. Hamdioui, M. Taouil, M. Krstic, P. Langendörfer, Z. Dyka, M. Huebner, J. Nolte, H.T. Vierhaus, M. Sonza Reorda, G. Squillero, L. Sterpone, J. Raik, D. Alexandrescu, M. Glorieux, G. Selimis, G.J. Schrijen, A. Klotz, C. Sauer, M. Jenihhin: "RESCUE EDA Toolset for Interdependent Aspects of Reliability, Security and Quality in Nanoelectronic Systems Design", Proc. Design, Automation and Test in Europe (DATE 2019), (2019)
K. Lehniger, Y. Varabei, M. Aftowicz, S.E.H. Rastegar, Z. Dyka, P. Langendörfer: "Using Machine Learning Techniques for Hardware Performance Counter Classification and ROP Attack ", Proc. 31st Crypto Day Matters 2019, (2019)
R. Natarov, Y. Varabei, I. Kabin, Z. Dyka, P. Langendörfer: "Edge Computing Devices Assessment for Cryptography and Biomedical Signal Analysis", Proc. 31st Crypto Day Matters 2019, (2019)
Y. Varabei, I. Kabin, Z. Dyka, D. Klann, P. Langendörfer: "Intelligent Clustering as a Means to Improve K-Means Based Horizontal Attacks", Proc. 31st Crypto Day Matters 2019, (2019)
A. Sosa, I. Kabin, Z. Dyka, D. Klann, P. Langendörfer: "On the Impact of the Sampling Rate on the Success of Horizontal DEMA Attack", Proc. 31st Crypto Day Matters 2019, (2019)
M. Aftowicz, D. Klann, I. Kabin, Z. Dyka, P. Langendörfer: "Evaluation of the ECDSA IHP Hardware Accelerator", Proc. 31st Crypto Day Matters 2019, (2019)
P. Langendörfer: "Security Engineering for Cyber Physical Systems", Proc. 22nd EUROMICRO Conference on Digital System Design and Software Engineering and Advanced, 2019
Ievgen Kabin, Zoya Dyka, Dan Klann, Peter Langendoerfer: "Horizontal Attacks against ECC: from Simulations to ASIC", Proceedings of 24th European Symposium on Research in Computer Security (ESORICS 2019) Workshops - Information & Operational Technology (IT & OT) security systems (IOSEC), 2019
Ievgen Kabin, Zoya Dyka, Dan Klann, Peter Langendoerfer: "On the complexity of attacking Commercial Authentication Products", In Proceedings of Cybersecurity on Hardware (SecHard) Workshop, 2019 (best paper award)
Ievgen Kabin, Marcin Aftowicz, Yauhen Varabei, Dan Klann, Zoya Dyka and Peter Langendoerfer: "Horizontal Attacks Using K-means: Comparison with Traditional Analysis Methods", Proceedings of 10th IFIP International Conference on New Technologies, Mobility & Security, 2019
Yauhen Varabei, Ievgen Kabin, Zoya Dyka, Dan Klann and Peter Langendoerfer: "Intelligent Clustering as a Means to Improve K-Means Based Horizontal Attacks", IEEE 30th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC) Workshops - W4: Workshop on Machine Learning for Security and Cryptography, 2019 (best paper award)
Zoya Dyka, Dan Kreiser, Ievgen Kabin and Peter Langendoerfer. Flexible FPGA ECDSA Design with a Field Multiplier Inherently Resistant against HCCA In Proceedings of International Conference on Reconfigurable Computing and FPGAs (ReConFig), 2018
Ievgen Kabin, Dan Kreiser, Zoya Dyka and Peter Langendoerfer. FPGA Implementation of ECC: Low-Cost Countermeasure against Horizontal Bus and Address-Bit SCA In Proceedings of International Conference on Reconfigurable Computing and FPGAs (ReConFig), 2018
M. Brzozowski, M. Frohberg, P. Langendörfer Real-World Deployments of Sensor Networks: Practical Lessons for Researchers 16th IFIP International Conference on Wired/Wireless Internet Communications WWIC, Springer, 2018
Ievgen Kabin, Zoya Dyka, Dan Kreiser and Peter Langendoerfer: Unified Field Multiplier for ECC Inherent Resistance against Horizontal SCA Attacks, Proc. of the 13th IEEE Conference on Design & Technology of Integrated Systems, 2018
Dan Kreiser, Zoya Dyka, Ievgen Kabin, Peter Langendoerfer: Low-Energy Key Exchange for Automation Systems, Proc. of the 13th IEEE Conference on Design & Technology of Integrated Systems, 2018
Ievgen Kabin, Zoya Dyka, Dan Kreiser and Peter Langendoerfer: Horizontal Address-Bit DPA against Montgomery kP Implementation, In Proceedings of International Conference on Reconfigurable Computing and FPGAs (ReConFig), 2017
Ievgen Kabin, Zoya Dyka, Dan Kreiser and Peter Langendoerfer: Methods for increasing the resistance of cryptographic designs against horizontal DPA Attacks Proc. 19th International Conference on Information and Communications Security (ICICS 2017), 2017
Ievgen Kabin, Zoya Dyka, Dan Kreiser, Peter Langendoerfer: Evaluation of resistance of ECC designs protected by different randomization countermeasures against horizontal DPA attacks, IEEE East-West Design & Test Symposium (EWDTS), vol. 00, no. , pp. 1-7, 2017, doi:10.1109/EWDTS.2017.8110037
St. Kornemann, P. Langendörfer, O. Stecklina: SECI - Lightweight Interpreter for Security Algorithms e 18th ACM international symposium on mobile ad hoc networking and computing. ACM, (MobiHoc Workshops) 2017
A. Sojka-Piotrowska, P. Langendoerfer: Shortening the security parameters in lightweight WSN applications for IoT-lessons learned Pervasive Computing and Communications Workshops (PerCom Workshops), 2017
C. Wittke, Z. Dyka, P. Langendoerfer: Comparison of EM Probes Using SEMA of an ECC Design, 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS), 2016
Z. Dyka, E. A. Bock, I. Kabin, P. Langendoerfer: Inherent Resistance of Efficient ECC Designs against SCA Attacks 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS), 2016
Wittke C., Dyka Z., Skibitzki O., Langendoerfer P.: Preparation of SCA Attacks: Successfully Decapsulating BGA Packages. In: Bica I., Reyhanitabar R. (eds) Innovative Security Solutions for Information Technology and Communications. SECITC 2016. Lecture Notes in Computer Science, vol 10006. Springer, Cham
E. A. Bock, Z. Dyka, P. Langendoerfer: Increasing the Robustness of the Montgomery kP-Algorithm against SCA by Modifying its Initialization In: Bica I., Reyhanitabar R. (eds) Innovative Security Solutions for Information Technology and Communications. SECITC 2016. Lecture Notes in Computer Science, vol 10006. Springer, Cham
O. Stecklina, P. Langendörfer, F. Vater, T. Kranz, G. Leander Intrinsic Code Attestation by Instruction Chaining for Embedded Devices SecureComm 2015
Z. Dyka, Ch. Wittke, P. Langendörfer: Clockwise Randomization of the Observable Behaviour of Crypto ASICs to Counter Side Channel Attacks. Euromicro Conference on Digital System Design (DSD), Proceedings, Funchal (Madeira, Portugal), 26-28 August 2015, pp. 551-554.
M. Brzozowski, P. Langendoerfer: Bug-Tolerant Sensor Networks: Experiences from Real-World Applications. Ad Hoc Networks. Springer International Publishing, 2015.
Jens-Matthias Bohli, Antonio Skarmeta, M Victoria Moreno, Dan García, Peter Langendörfer, SMARTIE project: Secure IoT data management for smart cities International Conference on Recent Advances in Internet of Things (RIoT), 2015
Z. Dyka, F. Vater, Ch. Wittke, A. Datsuk, P. Langendoerfer: Using Supply Voltage Metal Layers as Low Cost Means to Hinder Several Types of Physical Attacks Proceedings of the International Conference in Information Security and Digital Forensics, Thessaloniki, Greece, 2014
M Brzozowski, P Langendoerfer Multi-channel support for preamble sampling MAC protocols in sensor networks 22nd IEEE Conference on Software, Telecommunications and Computer Networks (SoftCOM), 2014
M. Brzozowski, P. Langendörfer: Is Cross-Platform Protocol Stack Suitable for Sensor Networks? Empirical Evaluation, Proc. 6th Join IFIP Wireless & Mobile Networking Conference, 2013
O. Stecklina, P. Langendörfer, Ch. Goltz: A Fair Trade Multi-Hop Routing in Wireless Sensor Networks, Proc. 6th Joint IFIP Wireless & Mobile Networking Conference, 2013
Oliver Stecklina, Peter Langendörfer, Hannes Menzel: Design of a tailor-made Memory Protection Unit for Low Power Microcontrollers, 8th IEEE International Symposium on Industrial Embedded Systems (SIES), 2013
E. Vogiatzaki, P. Langendörfer, St. Ortmann: Advanced Media Technologies for Stroke Rehabilitation, Proc. 17th Annual CyberPsychology CyberTherapy Conference - Experience the Future of Health & Well Being (iACToR's), 2012
Z. Dyka, Ch. Walcyk, D. Walczyk, Ch. Wenger, P. Langendörfer: Side Channel Attacks and the Non-Volatile Memory of the Future, International Conference on Compilers, Architectures and Synthesis for Embedded Systems (CASES 2012), Tampere, October 08, 2012, Finland (invited)
St. Peter, P. Langendörfer: Tool-Supported Methodology for Component-Based Design of Wireless Sensor Network Applications, The 4th International Workshop on Component-Based Design of Resource-Constrained Systems, (CORCS 2012), Izmir, July 16 - 20, 2012, Turkey
K. Piotrowski, A. Sojka, P. Langendörfer: Long-Range Wireless Sensor Nodes-Lessons Learned 6th European Conference on Antennas and Propagation, (EuCAP 2012), Prague, March 26 - 30, 2012, Czech Republic
K. Piotrowski, St. Ortmann, P. Langendörfer: Multi-Radio Wireless Sensor Node for Mobile Biomedical Monitoring BMT 2012, 46th DGBMT Annual Conference, Jena, September 16 - 19, 2012, Germany
Z. Dyka, P. Langendörfer, F. Vater, St. Peter: Towards Strong Security in Embedded and Pervasive Systems: Energy and Area Optimized Serial Polynomial Multipliers in GF(2k) 5th IFIP International Conference on New Technologies, Mobility and Security, (NTMS 2012), Istanbul, May 07 - 10, 2012, Turkey
P. Langendörfer, K. Piotrowski, M. Diaz, B. Rubio: Distributed Shared Memory as an Approach for Integrating WSNs and Cloud Computing NTMS Workshop on Wireless Sensor Networks: Architectures, Deployments and Trends (WSN-ADT), Istanbul, May 07 - 10, 2012, Turkey
Zoya Dyka Peter Langendörfer F. Vater: Combining Multiplication Methods with Optimized Processing Sequence for Polynomial Multiplier in GF(2k), in Lecture Notes in Computer Science Volume 7242, 2012, pp 137-150
Steffen Ortmann, Peter Langendörfer: A telemedicine system for improved rehabilitation of stroke patients, International Conference on Health Informatics, Algarve, Portugal, February, 2012
Steffen Ortmann, Peter Langendörfer, Cecília Sík Lányi: Telemedical assistance for ambulant rehabilitation of stroke patients, 9th World Congress on Brain Injury, Edinburgh, Scotland, March, 2012
St. Ortmann, P. Langendörfer: The Impact of Social Networks on User Privacy - What Social Networks Really Learn about their Users 7th International Conference on Web Information Systems and Technologies (WEBIST 2011), Noordwijkerhout, May 06 - 09, 2011, The Netherlands
A. Sojka, K. Piotrowski, P. Langendörfer: Symbiosis on a Lightweight ECC Security and Distributed Shared Memory in Wireless Sensor Networks, Proc. 4th International Workshop on Dependable Network Computing and Mobile Systems (DNCMS, SRDS), (2011)
O. Stecklina, P. Langendörfer: Ubiquitous Computing Asks for Ubiquitous Line of Defense Proc. Workshop on IT-Security in collaborative and highly networked systems (German event) 2011
M. Brzozowski, H. Salomon, K. Piotrowski, P. Langendörfer: Cross-Platform Protocol Development for Sensor Networks: Lessons Learned ACM/IEEE International Conference on Software Engineering (ICSE 2011), SESENA Workshop, Honolulu, May 21 - 28, 2011, USA
O. Stecklina, P. Langendörfer, H. Menzel: Toward a secure address space solution for low power sensor nodes, International Conference on Pervasive and Embedded Computing and Communication Systems, 2010
M. Brzozowski, H. Salomon, P. Langendörfer: ILA: Idle Listening Avoidance in Scheduled Wireless Sensor Networks, Proc. 8th International Conference on Wired / Wireless Internet Communications, (WWIC 2010), Berlin, Springer, LNCS 6074, 363 (2010)
M. Brzozowski, H. Salomon, P. Langendörfer: Limiting End-to-End Delays in Long-Lasting Sensor Networks 8th ACM International Symposium on Mobility Management and Wireless Access (MobiWac 2010), Bodrum, October 17 - 21, 2010, Turkey
K. Piotrowski, A. Sojka, P. Langendörfer: Body Area Network for First Responders - a Case Study, 5th International Conference on Body Area Networks (BodyNets 2010), Corfu, September 10 - 12, 2010, Greece
A. Sojka, K. Piotrowski, P. Langendörfer: ShortECC: a Lightweight Security Approach for Wireless Sensor Networks International Conference on Security and Cryptography (SECRYPT 2010), Athens, July 26 - 28, 2010, Greece
M. Maaser, P. Langendörfer, St. Nowak: Automated Mapping of MAC Parameters into Generic QoS Parameters by Inter-MAC Adaptors, PIMRC, 2010
St. Peter, F. Vater, P. Langendörfer: Sicherheits-Engineering am Beispiel von drahtlos angebundenen Sensor/Aktor-Systemen in der Automatisierungstechnik, SPS/IPC/Drives, Elektrische Automatisierung, Fachmesse und Kongress, Nürnberg November 24 - 26, 2009, Germany
A: Grilo, K: Piotrowski; P: Langendörfer, A. Casaca: A Wireless Sensor Network Architecture for Homeland Security Application; Proceedings of The 8th International Conference on Ad hoc Networks and Wireless, Springer LNCS, 2009
M. Brzozowski, H. Salomon P. Langendörfer: Completely distributed low duty cycle communication for long-living sensor networks, 7th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC-09), 2009
St. Peter, O. Stecklina, P. Langendörfer: An Engineering Approach for Secure and Safe Wireless Sensor and Actuator Networks for Industrial Automation Systems, accepted for 14th IEEE International Conference on Emerging Technologies and Factory Automation, 2009
St. Ortmann, M. Maaser, P. Langendörfer: Adaptive pruning of Event Decision Trees for energy efficient collaboration in event-driven WSN, accepted for Third International Workshop on Information Fusion and Dissemination in Wireless Sensor Networks, in conjunction with MobiQuitous'09, 2009
K. Piotrowski, P. Langendörfer, S. Peter: tinyDSM: A Highly Reliable Cooperative Data Storage for Wireless Sensor Networks, Proceedings Distributed Collaborative Sensor Networks Workshop (DCSN), 2009
M. Brzozowski, P. Langendörfer: On Prolonging Sensornode Gateway Lifetime by Adapting its Duty Cycle, Proceedings WWIC 2009, Springer LNCS, 2009
P. Langendörfer, F. Vater, K. Piotrowski: Customizing Sensor Nodes and Software for Individual Pervasive Health Applications, Proceedings 3rd International Conference on Pervasive Computing Technologies for Healthcare, 2009
M. Brzozowski, K. Piotrowski, P. Langendörfer: A Cross-Layer Approach for Data Replication and Gathering in Decentralized Long-Living Wireless Sensor Networks, Proceedings 9th International Symposium on Autonomous Decentralized Systems, 2009
T. Meyer, P. Langendörfer, R. Jennen, St. Nowak, M. Bahr: An Inter-MAC Architecture for Heterogeneous Gigabit Home Networks, Workshop on Inter-Mac Management and Multiple interfaces for Multi-Gigabit Wireless Systems, PIMRC, 2009
St. Peter, P. Langendörfer, K. Piotrowski: In-Network-Aggregation as Case Study for a Support Tool Reducing the Complexity of Designing Secure Wireless Sensor Networks, Third IEEE International Workshop on Practical Issues in Building Sensor Network Applications, 2008
F. Vater, St. Peter, P. Langendörfer: An On-chip Security Monitoring Solution For System Clock For Low Cost Devices, Participants Proceedings of the 3rd Workshop on Embedded Systems Security (WESS'2008) A Workshop of the IEEE/ACM EMSOFT'2008 and the Embedded Systems Week, 2008
Peter Langendörfer, Antonio Grilo, Krzysztof Piotrowski, A. Casaca: A Wireless Sensor Network Reliable Architecture for Intrusion Detection, 4th Next Generation Internet Networks, Conference (NGI), 2008
St. Ortmann, P. Langendörfer: Enhancing reliability of sensor networks by fine tuning their event observation behaviour, 2nd IEEE WoWMoM Workshop on Adaptive and DependAble Mission- and bUsiness-critical mobile Systems (ADAMUS) 2008
P. Langendörfer, M. Maaser: Privacy Guaranteeing Execution Containers: One time use of personal data by location based services, Proceedings of 1st International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications, ACM, 2008
J. Reinöhl, P. Langendörfer, R. Kraemer, M. Zehender: Ein Weg aus dem Dilemma der oberflächlichen Messsysteme, angenommen für Proceedings Ambient Assisted Living Congress, VDI|VDE|TI, 2008
S. Ortmann, P. Langendörfer, M. Maaser: Enhancing Privacy by Applying Information Flow Modelling in Pervasive Systems, R. Meersmann, Z. Tari, P. Herrero et al (eds.) OTM Workshops, Springer LNCS, 2007
S. Ortmann, P. Langendörfer, M. Maaser: A Self-Configuring Privacy Management Architecture for Pervasive Systems, Proceedings of the 5th ACM International Workshop on Mobility Management and Wireless Access – MobiWac, ACM Press 2007
P. Langendörfer, Steffen Peter, Krzysztof Piotrowski, Renato Nunes, and Augusto Casaca: A Middleware Approach to Configure Security in WSN, Proceedings of the 1st ERCIM Workshop on e-Mobility, 2007
F. Vater, St. Peter, P. Langendörfer: Combinatorial logic circuitry as means to protect low cost devices against side channel attacks Proceedings of the Workshop in Information Security Theory and Practices 2007 , Springer LNCS, 2007
F. Winkler, B. Meffert, P. Langendörfer, E. Fischer: Indoor Localization based on Wireless LAN, Proceedings of 3rd Third International ACM Conference on Intelligent Computing and Information Systems, 2007
M. Maaser, S. Ortmann, P. Langendörfer: The Privacy Advocate (PrivAd): A Framework for Negotiating Individual Privacy Contracts, 3rd International Conference on Web Information Systems and Technologies (WEBIST), 2007
St. Peter, P. Langendörfer Flexible Hardware Reduction for Elliptic Curve Cryptography in GF(2m) Proceedings of Design Automation and Test in Europe (DATE) Conference, IEEE Society Press, 2007
St. Peter, P. Langendörfer: An Efficient Polynomial Multiplier in GF(2m) and its Application to ECC Designs, Proceedings of Design Automation and Test in Europe (DATE) Conference, IEEE Society Press, 2007
St. Peter, K. Piotrowski, P. Langendörfer: On Concealed Data Aggregation for Wireless Sensor Networks, Proceedings of 4th IEEE Consumer Communications and Networking Conference (CCNC), 2007
M. Maaser, S. Ortmann, P. Langendörfer: NEPP: Negotiation Enhancements for Privacy Policies, W3C Workshop on Languages for Privacy Policy Negotiation and Semantics-Driven Enforcement, October 2006
K. Piotrowski, P. Langendörfer, St. Peter: How Public Key Cryptography Influences Wireless Sensor Node Lifetime, Proceedings of the Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), Oktober 2006
P. Langendörfer, S. Adam: A Graphical Tool for Specification, Rapid Prototyping and Implementation of Location Based Services, Proceedings des VDE Kongress 2006 Innovations for Europe: Mobility, VDE Verlag, October 2006
P. Langendörfer, M. Lehmann, K. Piotrowski: Efficient Protection of Mobile Devices by Cross layer Interaction of Firewall Approaches, in Proceedings of the 4th International Conference on Wired/Wireless Internet Communications, LNCS, Springer, 2006
F. Winkler, E. Fischer, E. Grass, P. Langendörfer: An Indoor Localization System Based on DTDOA for Different Wireless LAN Systems, Proceedings of the 3rd Workshop on Positioning, Navigation and Communication 2006 (WPNC’06), Shaker, 2006
P. Langendörfer, K. Piotrowski: More Privacy in Context-aware Platforms: User Controlled Access Right Delegation using Kerberos, WSEAS International Conference on Information Security, Communications and Computers (ISCOCO’05), 2005
M. Maaser, P. Langendörfer: Automated Negotiation of Privacy Contracts, Proceedings of the 29th Annual International Computer Software and Applications Conference (COMPSAC), IEEE Society Press, 2005
P. Langendörfer, K. Piotrowski, M. Maaser: Charged Location Aware Services - A Privacy Analysis, Proceedings of the 4th International Conference on Mobile Business (ICMB), IEEE Society Press, 2005
K. Piotrowski, P. Langendörfer, M. Maaser, G. Spichal, P. Schwander: Charged Location Aware Services, Proceedings of the 4th International Workshop on Wireless Information Systems (WIS), INSTICC Press, 2005
P. Langendörfer: Privacy and Convenient Up Time of Mobile Devices: An Antagonism?, Proceedings of the International Conference on Research Trends in Science and Technology (RTST), (invited), 2005
P. Langendörfer, M. Lehmann: Implementation Independent Profiling of SDL Specifi-cations, Proceedings of Software Engineering, GI-LNI, 2005
Z. Dyka, P. Langendörfer: Area Efficient Hardware Implementation of Elliptic Curve Cryptography by Iteratively Applying Karatsuba’s Method; Proceedings of Design Automation and Test in Europe (DATE) Conference, IEEE Society Press, 2005
D. Kulikowski, P. Langendörfer, K. Piotrowski: A location-aware Revocation System, In P. Dadam, M. Reichert (eds.) Informatik 2004, Band 2, GI-LNI, 2004
R. Kraemer, K. Dombrowski, D. Dietterle, P. Langendörfer, M. Methfessel: Remote Operations: A Middleware and Distributed Systems Architecture for Satellite On-Board Wireless Communication, Proceedings of the 7th International Conference on Data Systems in Aerospace (DASIA), 2004
P. Langendörfer, H. Maass, Th. Falck: PLASMADS: Smart Mobiles Meet Intelligent Environments, In Proceedings of the 4th IEEE Workshop on Applications and Services in Wireless Networks, IEEE Press, 2004
K. Piotrowski, P. Langendörfer, D. Kulikowski: Moneta: An Anonymity Providing Lightweight Payment System for Mobile Devices, Proceedings of 2nd GI/IFIP Workshop on Virtual Goods, 2004
K. Piotrowski, P. Langendörfer, O. Maye: Ensuring Anonymity in e-Commerce Systems using a Hidden Identity Approach: Discussion of Problems and Solutions, In Proceedings of 7th International Conference on Electronic Commerce Research (ICECR7), 2004
A. Post, P. Langendörfer, R. Kraemer: Applying Position Prediction as a Means for Performance-tuning in Location-aware Platforms, Proceedings of the 1st Workshop on Positioning, Navigation and Communication (WPNC’04), Shaker, 2004
M. Bennicke, P. Langendörfer: Towards Automatic Negotiation of Privacy Contracts for Internet Services, Proceedings of 11th IEEE Conference on Computer Networks, IEEE Society Press, 2003
P. Langendörfer, Z. Dyka, F. Vater, O. Maye, Rolf Kraemer: A Vertical Approach towards Energy-efficient Application of Cipher Mechanisms in Hot-spots Running Location-aware Services, International Conference on Advances in the Internet, Processing, Systems, and Interdisciplinary Research, 2003
P. Langendörfer, Z. Dyka, O. Maye, R. Kraemer: A Low Power Security Architecture for Mobile Commerce, Proceedings of 5th IEEE CAS Workshop on Wireless Communications and Networking, IEEE Society Press 2002
P. Langendörfer: m-commerce why it does not fly (yet?). Proceedings of the International Conference on Advances in Infrastructure for e-business, e-Education, e-Science and e-Medicine on the Internet, 2002
P. Langendörfer, R. Kraemer: Towards User Defined Privacy in Location-aware Platforms. In P. Langendörfer, V. Tsaoussidis (eds.), Proceedings of the 3rd International Conference on Internet Computing, CSREA Press, 2002
M. Methfessel, E. Grass, P. Langendörfer, K. Dombrowski, R. Kraemer: Wireless Terminal Development Toolbox. 6th Meeting of the Wireless World Research Forum, 2002
K. Dombrowski, M. Methfessel, P. Langendörfer, H. Frankenfeldt, I. Babanskaja, I. Matthaei, R. Kraemer: Vertical Optimization of Data Transmission for Energy Aware Mobile Devices. In Proceedings of the IEEE International Conference on Wireless LANs and Home Networks, 2001
S. Twarok, P. Langendörfer, H. König: Automated Derivation of ILP Implementations from SDL Specifications. In Proceedings of the 21st IFIP WG 6.1 International Conference on Formal Description Techniques for Networked and Distributed Systems, Kluwer, 2001
M. Methfessel, P. Langendörfer, H. Frankenfeldt, I. Babanskaja, I. Matthaei, R. Kraemer: Optimizing the Cooperation between TCP and wireless MAC In P. Graham, M. Maheswaran (eds.): Proceedings of the International Conference on Internet Computing, CSREA Press, 2001
P. Langendörfer, H. König: Evaluation of well-known Implementation Techniques for Application in Mobile Networks, In P. Graham, M. Maheswaran (eds.): Proceedings of the International Conference on Internet Computing, CSREA Press, 2000
P. Langendörfer, H. König: Deriving Activity Thread Implementations from Formal Descriptions Using Transition Reordering. In Wu, J.; Chanson, S.T.; Gao, Q. (eds.): Formal Methods for Protocol Engineering and Distributed Systems, Kluwer, 1999
P. Langendörfer, H. König: Automated Protocol Implementations Based on Activity Threads. Proceedings of the 7th International Conference on Network Protocols (ICNP), IEEE Society Press, 1999
P. Langendörfer, H. König: COCOS - A Configurable SDL Compiler for Generating Efficient Protocol Implementations. In Dssouli, R.; Bochmann, G.; Lahav, Y.(eds.): SDL’99 The Next Millenium. Elsevier, 1999
P. Langendörfer, H. König: A Configurable Code Generation Tool for SDL. In Rozic N.; Begusic, D.; Pavelin, I. Burmaz, B. (eds.) SoftCOM’ 98, Proceedings of the 6th International Conference on Software in Telecommunications and Computer Networks (sponsored by IEEE Communications Society Technical Committee of Communication Software), 1998
P. Langendörfer, O. Jukic: Experience with Teaching and Learning Formal Description Techniques at BTU and FER. Proceedings of the 21th MIPRO Conference Computers in Telecommunications, Opatjia, Croatia, IEEE Croatia Section, 1998
P. Langendörfer, H. König: Specification and Validating Quality of Service Requirements Using Signal Chains. Proceedings of the Workshop on Performance and Time in SDL/MSC, A. Mitschele-Thiel, B. Müller-Clostermann, R. Reed (eds.), Erlangen, 1998
P. Langendörfer, H. König: Improving the Efficiency of Automatically Generated Code by Using Implementation-specific Annotations. Proceedings of the 3rd International Workshop on High Performance Protocol Architectures HIPPARCH’ 97, P. Gunningberg, C. Huitema (eds.), Uppsala, Schweden, 1997
P. Langendörfer: An Annotational Extention of SDL’ 92 to Support a Formal Implementation Specification. In Proceedings of the 2nd International Workshop on Applied Formal Methods in System Design, I. Lovrek (ed.), Zagreb, 1997
A. Mitschele-Thiel, P. Langendörfer, R. Henke: Design and Optimization of High-Performance Protocols with the DO-IT Toolbox. In Proc. IFIP WG 6.1 International Conference on Formal Description Techniques for Networked and Distributed Systems, R. Gotzhein, J. Bredereke (eds), Chapman-Hall, 1996