Krzysztof Piotrowski Coauthor index DBLP Vis pubzone.org

List of publications from the DBLP Bibliography Server - FAQ
Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

DBLP keys2009
11Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAntónio Grilo, Krzysztof Piotrowski, Peter Langendörfer, Augusto Casaca: A Wireless Sensor Network Architecture for Homeland Security Application. ADHOC-NOW 2009: 397-402
2008
10Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLSteffen Peter, Krzysztof Piotrowski, Peter Langendörfer: In-network-aggregation as case study for a support tool reducing the complexity of designing secure wireless sensor networks. LCN 2008: 778-785
9Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLSteffen Peter, Peter Langendörfer, Krzysztof Piotrowski: Public key cryptography empowered smart dust is affordable. IJSNET 4(1/2): 130-143 (2008)
2007
8Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLSteffen Peter, Peter Langendörfer, Krzysztof Piotrowski: Flexible hardware reduction for elliptic curve cryptography in GF(2m). DATE 2007: 1259-1264
7Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeter Langendoerfer, Krzysztof Piotrowski, Steffen Peter, Martin Lehmann: Crosslayer firewall interaction as a means to provide effective and efficient protection at mobile devices. Computer Communications 30(7): 1487-1497 (2007)
2006
6Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLKrzysztof Piotrowski, Peter Langendörfer, Steffen Peter: How public key cryptography influences wireless sensor node lifetime. SASN 2006: 169-176
5Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeter Langendörfer, Martin Lehmann, Krzysztof Piotrowski: Efficient Protection of Mobile Devices by Cross Layer Interaction of Firewall Approaches. WWIC 2006: 155-165
4Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLKrzysztof Piotrowski, Peter Langendörfer, Oliver Maye, Zoya Dyka: Protecting privacy in e-cash schemes by securing hidden identity approaches against statistical attacks. Internet Research 16(2): 159-169 (2006)
2005
3Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPeter Langendörfer, Krzysztof Piotrowski, Michael Maaser: Charged Location Aware Services - A Privacy Analysis. ICMB 2005: 116-120
2no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLKrzysztof Piotrowski, Peter Langendörfer, Michael Maaser, Gregor Spichal, Peter Schwander: Charged Location Aware Services. Wireless Information Systems 2005: 33-41
2004
1no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDamian Kulikowski, Peter Langendörfer, Krzysztof Piotrowski: A location-aware Revocation Approach. GI Jahrestagung (2) 2004: 271-275

Coauthor Index

1Augusto Casaca [11]
2Zoya Dyka [4]
3António Grilo [11]
4Damian Kulikowski [1]
5Peter Langendörfer (Peter Langendoerfer) [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11]
6Martin Lehmann [5] [7]
7Michael Maaser [2] [3]
8Oliver Maye [4]
9Steffen Peter [6] [7] [8] [9] [10]
10Peter Schwander [2]
11Gregor Spichal [2]

Copyright © Fri Mar 12 12:56:28 2010 by Michael Ley (ley@uni-trier.de)