Search Results - "Langendoerfer, P."
-
1
Area Efficient Hardware Implementation of Elliptic Curve Cryptography by Iteratively Applying Karatsuba's Method
Published in Design, Automation and Test in Europe (01-01-2005)“…Securing communication channels is especially needed in wireless environments. But applying cipher mechanisms in software is limited by the calculation and…”
Get full text
Conference Proceeding -
2
Real-world deployments of sensor networks: Practical lessons for researchers
Published in Computer communications (01-09-2019)“…In this work we share lessons learned from our previous installations of wireless sensor networks and hope these lessons will help other research groups to…”
Get full text
Journal Article -
3
Improving the efficiency of automated protocol implementations using a configurable FDT compiler
Published in Computer communications (01-07-2000)“…The integration of efficient implementation techniques, which have been proven in manual coding, into FDT compilers is difficult because of the semantic…”
Get full text
Journal Article -
4
Application of wireless sensor networks in critical infrastructure protection: challenges and design options [Security and Privacy in Emerging Wireless Networks]
Published in IEEE wireless communications (01-10-2010)“…The protection of critical infrastructures provides an interesting application area for wireless sensor networks. Threats such as natural catastrophes,…”
Get full text
Journal Article -
5
Intelligence and Motion Models of Continuum Robots: an Overview
Published in IEEE access (01-01-2023)“…Many technical solutions are bio-inspired. Octopus-inspired robotic arms belong to continuum robots which are used in minimally invasive surgery or for…”
Get full text
Journal Article -
6
Automated negotiation of privacy contracts
Published in 29th Annual International Computer Software and Applications Conference (COMPSAC'05) (2005)“…Privacy in the Internet is currently not addressed or just stated to tacit acceptance. The user is left to either accept or deny the contractual conditions. A…”
Get full text
Conference Proceeding -
7
Adaptable Security in Wireless Sensor Networks by Using Reconfigurable ECC Hardware Coprocessors
Published in International journal of distributed sensor networks (01-01-2010)“…Specific features of Wireless Sensor Networks (WSNs) like the open accessibility to nodes, or the easy observability of radio communications, lead to severe…”
Get full text
Journal Article -
8
Protocol engineering for wired and wireless networks
Published in Computer communications (20-06-2004)Get full text
Journal Article -
9
Symbiosis of a Lightweight ECC Security and Distributed Shared Memory Middleware in Wireless Sensor Networks
Published in 2011 IEEE 30th Symposium on Reliable Distributed Systems Workshops (01-10-2011)“…In this paper we present our work on a combination of two approaches for wireless sensor networks (WSNs), to provide a self contained, reliable and secure…”
Get full text
Conference Proceeding -
10
A cross-layer approach for data replication and gathering in decentralized long-living wireless sensor networks
Published in 2009 International Symposium on Autonomous Decentralized Systems (01-03-2009)“…Realizing highly reliable wireless sensor networks with a long lifetime is a challenging task. A long lifetime is normally achieved by low duty cycles and rare…”
Get full text
Conference Proceeding -
11
Code Mutation as a mean against ROP Attacks for Embedded Systems
Published in 2022 11th Mediterranean Conference on Embedded Computing (MECO) (07-06-2022)“…This paper presents a program-code mutation technique that is applied in-field to embedded systems in order to create diversity in a population of systems that…”
Get full text
Conference Proceeding -
12
An engineering approach for secure and safe wireless sensor and actuator networks for industrial automation systems
Published in 2009 IEEE Conference on Emerging Technologies & Factory Automation (01-09-2009)“…Wireless communication and smart sensors and actuators pose means to sustainably improve automation technology. Unfortunately they also cause an abundance of…”
Get full text
Conference Proceeding -
13
Some open issues on internetworking for the next generation
Published in Computer communications (20-06-2004)“…In this survey we focus on open issues of the wireless Internet. Our main intention is to elaborate what has to be done to integrate mobile devices in the…”
Get full text
Journal Article -
14
Is cross-platform protocol stack suitable for sensor networks? Empirical evaluation
Published in 6th Joint IFIP Wireless and Mobile Networking Conference (WMNC) (01-04-2013)“…Software for sensor networks is usually coupled with the operating system (OS) and suffers from numerous limitations. For example, developers cannot examine…”
Get full text
Conference Proceeding -
15
tinyDSM: A highly reliable cooperative data storage for Wireless Sensor Networks
Published in 2009 International Symposium on Collaborative Technologies and Systems (01-05-2009)“…The advantage of a Wireless Sensor Network (WSN) compared to a centric approach is the distribution of sensing suites. However, in order for such a system of…”
Get full text
Conference Proceeding -
16
A fair energy trade multi-hop routing in wireless sensor networks
Published in 6th Joint IFIP Wireless and Mobile Networking Conference (WMNC) (01-04-2013)“…Wireless sensor networks become more and more attractive for a broad variety of application scenarios. Wireless Sensor Network (WSN)s are cheap and can be…”
Get full text
Conference Proceeding -
17
Towards Strong Security in Embedded and Pervasive Systems: Energy and Area Optimized Serial Polynomial Multipliers in GF(2k)
Published in 2012 5th International Conference on New Technologies, Mobility and Security (NTMS) (01-05-2012)“…In this paper we discuss a theoretical approach to do early assessment of the area and power consumption of hardware accelerators for elliptic curve…”
Get full text
Conference Proceeding -
18
Long-range wireless sensor nodes - Lessons learned
Published in 2012 6th European Conference on Antennas and Propagation (EUCAP) (01-03-2012)“…This paper presents our experiences with long-range wireless sensor node modules we gathered during the preparation of the water distribution monitoring…”
Get full text
Conference Proceeding -
19
Distributed Shared Memory as an Approach for Integrating WSNs and Cloud Computing
Published in 2012 5th International Conference on New Technologies, Mobility and Security (NTMS) (01-05-2012)“…In this paper we discuss the idea of combining wireless sensor networks and cloud computing starting with a state of the art analysis of existing approaches in…”
Get full text
Conference Proceeding -
20
On Efficient Clock Drift Prediction Means and their Applicability to IEEE 802.15.4
Published in 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (01-12-2010)“…Sensor nodes compensate clock drift with guard times (GT), which results in idle listening. By applying prediction methods nodes can limit drift uncertainty…”
Get full text
Conference Proceeding