Search the dblp DataBase
Peter Langendörfer :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Michael Maaser , Peter Langendörfer Automated Negotiation of Privacy Contracts. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:505-510 [Conf ] Peter Langendörfer , Hartmut König Automatische Generierung effizienter Protokollimplementierungen. [Citation Graph (0, 0)][DBLP ] FBT, 1999, pp:135-144 [Conf ] Peter Langendörfer , Thomas Krüger , Hartmut König Leistungsbewertung von SDL-Spezifikationen - Ein Werkzeug zur Bewertung von Implementierungstechniken. [Citation Graph (0, 0)][DBLP ] FBT, 2000, pp:143-152 [Conf ] Peter Langendörfer , Thomas Krüger , Sven Twarok Eine SDL-Laufzeitumgebung zur Unterstützung unterschiedlicher Implementationsstrategien. [Citation Graph (0, 0)][DBLP ] FBT, 1998, pp:245-254 [Conf ] Peter Langendörfer iSDL: Ein Ansatz zur Integration leistungssteigernder Implementierungsvorgaben in SDL'92. [Citation Graph (0, 0)][DBLP ] FBT, 1997, pp:303-311 [Conf ] Peter Langendörfer , Hartmut König Deriving Activity Thread Implementations from Formal Descriptions Using Transition Reordering. [Citation Graph (0, 0)][DBLP ] FORTE, 1999, pp:169-184 [Conf ] Andreas Mitschele-Thiel , Peter Langendörfer , Ralf Henke Design and Optimization of High-Performance Protocols with the DO-IT Toolbox. [Citation Graph (0, 0)][DBLP ] FORTE, 1996, pp:45-60 [Conf ] Sven Twarok , Peter Langendörfer , Hartmut König Automated Derivation of ILP Implementations from SDL Specifications. [Citation Graph (0, 0)][DBLP ] FORTE, 2001, pp:3-18 [Conf ] Damian Kulikowski , Peter Langendörfer , Krzysztof Piotrowski A location-aware Revocation Approach. [Citation Graph (0, 0)][DBLP ] GI Jahrestagung (2), 2004, pp:271-275 [Conf ] Peter Langendörfer , Hartmut König Evaluation of Well-Known Protocol Implementation Techniques for Application in Mobile Networks. [Citation Graph (0, 0)][DBLP ] International Conference on Internet Computing, 2000, pp:451-458 [Conf ] Peter Langendörfer , Rolf Kraemer Towards User Defined Privacy in Location- Aware Platforms. [Citation Graph (0, 0)][DBLP ] International Conference on Internet Computing, 2002, pp:335-341 [Conf ] Michael Methfessel , Peter Langendörfer , Horst Frankenfeldt , Irina Babanskaja , Irina Matthaei , Rolf Kraemer Optimizing the Cooperation Between TCP and Wireless MAC. [Citation Graph (0, 0)][DBLP ] International Conference on Internet Computing (1), 2001, pp:339-345 [Conf ] Peter Langendörfer , Krzysztof Piotrowski , Michael Maaser Charged Location Aware Services - A Privacy Analysis. [Citation Graph (0, 0)][DBLP ] ICMB, 2005, pp:116-120 [Conf ] Peter Langendörfer , Hartmut König Automated Protocol Implementations Based on Activity Threads. [Citation Graph (0, 0)][DBLP ] ICNP, 1999, pp:3-10 [Conf ] Krzysztof Piotrowski , Peter Langendörfer , Steffen Peter How public key cryptography influences wireless sensor node lifetime. [Citation Graph (0, 0)][DBLP ] SASN, 2006, pp:169-176 [Conf ] Peter Langendörfer , Hartmut König COCOS - A configurable SDL compiler for generating efficient protocol implementations. [Citation Graph (0, 0)][DBLP ] SDL Forum, 1999, pp:259-274 [Conf ] Peter Langendörfer , Martin Lehmann Implementation Independent Profiling of SDL Specifications. [Citation Graph (0, 0)][DBLP ] Software Engineering, 2005, pp:155-166 [Conf ] Krzysztof Piotrowski , Peter Langendörfer , Michael Maaser , Gregor Spichal , Peter Schwander Charged Location Aware Services. [Citation Graph (0, 0)][DBLP ] Wireless Information Systems, 2005, pp:33-41 [Conf ] Peter Langendörfer , Martin Lehmann , Krzysztof Piotrowski Efficient Protection of Mobile Devices by Cross Layer Interaction of Firewall Approaches. [Citation Graph (0, 0)][DBLP ] WWIC, 2006, pp:155-165 [Conf ] Hartmut König , Peter Langendörfer , Heiko Krumm Improving the efficiency of automated protocol implementations using a configurable FDT compiler. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2000, v:23, n:12, pp:1179-1195 [Journal ] Peter Langendörfer , Vassilios Tsaoussidis Protocol engineering for wired and wireless networks. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2004, v:27, n:10, pp:907- [Journal ] Peter Langendörfer , Vassilios Tsaoussidis Some open issues on internetworking for the next generation. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2004, v:27, n:10, pp:908-913 [Journal ] Peter Langendörfer , Rolf Kraemer , Hartmut König Evaluation of Well-Known Protocol Implementation Techniques for Application in Wireless Networks. [Citation Graph (0, 0)][DBLP ] The Journal of Supercomputing, 2001, v:20, n:2, pp:161-173 [Journal ] Peter Langendörfer , Michael Methfessel , Horst Frankenfeldt , Irina Babanskaja , Irina Matthaei , Rolf Kraemer Shielding TCP from Wireless Link Errors: Retransmission Effort and Fragmentation. [Citation Graph (0, 0)][DBLP ] The Journal of Supercomputing, 2002, v:23, n:3, pp:245-260 [Journal ] Peter Langendörfer Editorial Comments. [Citation Graph (0, 0)][DBLP ] The Journal of Supercomputing, 2002, v:23, n:3, pp:223-224 [Journal ] Xuemin Shen , Chuang Lin , Yan (Lindsay) Sun , Jianping Pan , Peter Langendörfer , Zhenfu Cao Wireless network security. [Citation Graph (0, 0)][DBLP ] , 2006, v:, n:, pp:269-271 [Journal ] Steffen Peter , Peter Langendörfer , Krzysztof Piotrowski Flexible hardware reduction for elliptic curve cryptography in GF(2m ). [Citation Graph (0, 0)][DBLP ] DATE, 2007, pp:1259-1264 [Conf ] Frank Vater , Steffen Peter , Peter Langendörfer Combinatorial Logic Circuitry as Means to Protect Low Cost Devices Against Side Channel Attacks. [Citation Graph (0, 0)][DBLP ] WISTP, 2007, pp:244-253 [Conf ] Frank Vater , Peter Langendörfer An Area Efficient Realisation of AES for Wireless Devices (Eine flächeneffiziente AES Hardwarerealisierung für drahtlose Geräte). [Citation Graph (0, 0)][DBLP ] it - Information Technology, 2007, v:49, n:3, pp:188-0 [Journal ] A Wireless Sensor Network Architecture for Homeland Security Application. [Citation Graph (, )][DBLP ] In-network-aggregation as case study for a support tool reducing the complexity of designing secure wireless sensor networks. [Citation Graph (, )][DBLP ] Enhancing Privacy by Applying Information Flow Modelling in Pervasive Systems. [Citation Graph (, )][DBLP ] The Privacy Advocate: Assertion of Privacy by Personalised Contracts. [Citation Graph (, )][DBLP ] ILA: Idle Listening Avoidance in Scheduled Wireless Sensor Networks. [Citation Graph (, )][DBLP ] A self-configuring privacy management architecture for pervasive systems. [Citation Graph (, )][DBLP ] Search in 0.002secs, Finished in 0.308secs