The SCEAS System
Navigation Menu

Search the dblp DataBase


Peter Langendörfer: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Michael Maaser, Peter Langendörfer
    Automated Negotiation of Privacy Contracts. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:505-510 [Conf]
  2. Peter Langendörfer, Hartmut König
    Automatische Generierung effizienter Protokollimplementierungen. [Citation Graph (0, 0)][DBLP]
    FBT, 1999, pp:135-144 [Conf]
  3. Peter Langendörfer, Thomas Krüger, Hartmut König
    Leistungsbewertung von SDL-Spezifikationen - Ein Werkzeug zur Bewertung von Implementierungstechniken. [Citation Graph (0, 0)][DBLP]
    FBT, 2000, pp:143-152 [Conf]
  4. Peter Langendörfer, Thomas Krüger, Sven Twarok
    Eine SDL-Laufzeitumgebung zur Unterstützung unterschiedlicher Implementationsstrategien. [Citation Graph (0, 0)][DBLP]
    FBT, 1998, pp:245-254 [Conf]
  5. Peter Langendörfer
    iSDL: Ein Ansatz zur Integration leistungssteigernder Implementierungsvorgaben in SDL'92. [Citation Graph (0, 0)][DBLP]
    FBT, 1997, pp:303-311 [Conf]
  6. Peter Langendörfer, Hartmut König
    Deriving Activity Thread Implementations from Formal Descriptions Using Transition Reordering. [Citation Graph (0, 0)][DBLP]
    FORTE, 1999, pp:169-184 [Conf]
  7. Andreas Mitschele-Thiel, Peter Langendörfer, Ralf Henke
    Design and Optimization of High-Performance Protocols with the DO-IT Toolbox. [Citation Graph (0, 0)][DBLP]
    FORTE, 1996, pp:45-60 [Conf]
  8. Sven Twarok, Peter Langendörfer, Hartmut König
    Automated Derivation of ILP Implementations from SDL Specifications. [Citation Graph (0, 0)][DBLP]
    FORTE, 2001, pp:3-18 [Conf]
  9. Damian Kulikowski, Peter Langendörfer, Krzysztof Piotrowski
    A location-aware Revocation Approach. [Citation Graph (0, 0)][DBLP]
    GI Jahrestagung (2), 2004, pp:271-275 [Conf]
  10. Peter Langendörfer, Hartmut König
    Evaluation of Well-Known Protocol Implementation Techniques for Application in Mobile Networks. [Citation Graph (0, 0)][DBLP]
    International Conference on Internet Computing, 2000, pp:451-458 [Conf]
  11. Peter Langendörfer, Rolf Kraemer
    Towards User Defined Privacy in Location- Aware Platforms. [Citation Graph (0, 0)][DBLP]
    International Conference on Internet Computing, 2002, pp:335-341 [Conf]
  12. Michael Methfessel, Peter Langendörfer, Horst Frankenfeldt, Irina Babanskaja, Irina Matthaei, Rolf Kraemer
    Optimizing the Cooperation Between TCP and Wireless MAC. [Citation Graph (0, 0)][DBLP]
    International Conference on Internet Computing (1), 2001, pp:339-345 [Conf]
  13. Peter Langendörfer, Krzysztof Piotrowski, Michael Maaser
    Charged Location Aware Services - A Privacy Analysis. [Citation Graph (0, 0)][DBLP]
    ICMB, 2005, pp:116-120 [Conf]
  14. Peter Langendörfer, Hartmut König
    Automated Protocol Implementations Based on Activity Threads. [Citation Graph (0, 0)][DBLP]
    ICNP, 1999, pp:3-10 [Conf]
  15. Krzysztof Piotrowski, Peter Langendörfer, Steffen Peter
    How public key cryptography influences wireless sensor node lifetime. [Citation Graph (0, 0)][DBLP]
    SASN, 2006, pp:169-176 [Conf]
  16. Peter Langendörfer, Hartmut König
    COCOS - A configurable SDL compiler for generating efficient protocol implementations. [Citation Graph (0, 0)][DBLP]
    SDL Forum, 1999, pp:259-274 [Conf]
  17. Peter Langendörfer, Martin Lehmann
    Implementation Independent Profiling of SDL Specifications. [Citation Graph (0, 0)][DBLP]
    Software Engineering, 2005, pp:155-166 [Conf]
  18. Krzysztof Piotrowski, Peter Langendörfer, Michael Maaser, Gregor Spichal, Peter Schwander
    Charged Location Aware Services. [Citation Graph (0, 0)][DBLP]
    Wireless Information Systems, 2005, pp:33-41 [Conf]
  19. Peter Langendörfer, Martin Lehmann, Krzysztof Piotrowski
    Efficient Protection of Mobile Devices by Cross Layer Interaction of Firewall Approaches. [Citation Graph (0, 0)][DBLP]
    WWIC, 2006, pp:155-165 [Conf]
  20. Hartmut König, Peter Langendörfer, Heiko Krumm
    Improving the efficiency of automated protocol implementations using a configurable FDT compiler. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2000, v:23, n:12, pp:1179-1195 [Journal]
  21. Peter Langendörfer, Vassilios Tsaoussidis
    Protocol engineering for wired and wireless networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2004, v:27, n:10, pp:907- [Journal]
  22. Peter Langendörfer, Vassilios Tsaoussidis
    Some open issues on internetworking for the next generation. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2004, v:27, n:10, pp:908-913 [Journal]
  23. Peter Langendörfer, Rolf Kraemer, Hartmut König
    Evaluation of Well-Known Protocol Implementation Techniques for Application in Wireless Networks. [Citation Graph (0, 0)][DBLP]
    The Journal of Supercomputing, 2001, v:20, n:2, pp:161-173 [Journal]
  24. Peter Langendörfer, Michael Methfessel, Horst Frankenfeldt, Irina Babanskaja, Irina Matthaei, Rolf Kraemer
    Shielding TCP from Wireless Link Errors: Retransmission Effort and Fragmentation. [Citation Graph (0, 0)][DBLP]
    The Journal of Supercomputing, 2002, v:23, n:3, pp:245-260 [Journal]
  25. Peter Langendörfer
    Editorial Comments. [Citation Graph (0, 0)][DBLP]
    The Journal of Supercomputing, 2002, v:23, n:3, pp:223-224 [Journal]
  26. Xuemin Shen, Chuang Lin, Yan (Lindsay) Sun, Jianping Pan, Peter Langendörfer, Zhenfu Cao
    Wireless network security. [Citation Graph (0, 0)][DBLP]
    , 2006, v:, n:, pp:269-271 [Journal]
  27. Steffen Peter, Peter Langendörfer, Krzysztof Piotrowski
    Flexible hardware reduction for elliptic curve cryptography in GF(2m). [Citation Graph (0, 0)][DBLP]
    DATE, 2007, pp:1259-1264 [Conf]
  28. Frank Vater, Steffen Peter, Peter Langendörfer
    Combinatorial Logic Circuitry as Means to Protect Low Cost Devices Against Side Channel Attacks. [Citation Graph (0, 0)][DBLP]
    WISTP, 2007, pp:244-253 [Conf]
  29. Frank Vater, Peter Langendörfer
    An Area Efficient Realisation of AES for Wireless Devices (Eine flächeneffiziente AES Hardwarerealisierung für drahtlose Geräte). [Citation Graph (0, 0)][DBLP]
    it - Information Technology, 2007, v:49, n:3, pp:188-0 [Journal]

  30. A Wireless Sensor Network Architecture for Homeland Security Application. [Citation Graph (, )][DBLP]

  31. In-network-aggregation as case study for a support tool reducing the complexity of designing secure wireless sensor networks. [Citation Graph (, )][DBLP]

  32. Enhancing Privacy by Applying Information Flow Modelling in Pervasive Systems. [Citation Graph (, )][DBLP]

  33. The Privacy Advocate: Assertion of Privacy by Personalised Contracts. [Citation Graph (, )][DBLP]

  34. ILA: Idle Listening Avoidance in Scheduled Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  35. A self-configuring privacy management architecture for pervasive systems. [Citation Graph (, )][DBLP]

Search in 0.004secs, Finished in 0.006secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002