2008 |
9 | EE | Steffen Peter,
Krzysztof Piotrowski,
Peter Langendörfer:
In-network-aggregation as case study for a support tool reducing the complexity of designing secure wireless sensor networks.
LCN 2008: 778-785 |
8 | EE | Steffen Peter,
Peter Langendörfer,
Krzysztof Piotrowski:
Public key cryptography empowered smart dust is affordable.
IJSNET 4(1/2): 130-143 (2008) |
2007 |
7 | EE | Steffen Peter,
Peter Langendörfer,
Krzysztof Piotrowski:
Flexible hardware reduction for elliptic curve cryptography in GF(2m).
DATE 2007: 1259-1264 |
6 | EE | Peter Langendoerfer,
Krzysztof Piotrowski,
Steffen Peter,
Martin Lehmann:
Crosslayer firewall interaction as a means to provide effective and efficient protection at mobile devices.
Computer Communications 30(7): 1487-1497 (2007) |
2006 |
5 | EE | Krzysztof Piotrowski,
Peter Langendörfer,
Steffen Peter:
How public key cryptography influences wireless sensor node lifetime.
SASN 2006: 169-176 |
4 | EE | Peter Langendörfer,
Martin Lehmann,
Krzysztof Piotrowski:
Efficient Protection of Mobile Devices by Cross Layer Interaction of Firewall Approaches.
WWIC 2006: 155-165 |
2005 |
3 | EE | Peter Langendörfer,
Krzysztof Piotrowski,
Michael Maaser:
Charged Location Aware Services - A Privacy Analysis.
ICMB 2005: 116-120 |
2 | | Krzysztof Piotrowski,
Peter Langendörfer,
Michael Maaser,
Gregor Spichal,
Peter Schwander:
Charged Location Aware Services.
Wireless Information Systems 2005: 33-41 |
2004 |
1 | | Damian Kulikowski,
Peter Langendörfer,
Krzysztof Piotrowski:
A location-aware Revocation Approach.
GI Jahrestagung (2) 2004: 271-275 |