Krzysztof Piotrowski

Orcid: 0000-0002-7231-6704

According to our database1, Krzysztof Piotrowski authored at least 29 papers between 2004 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Household Digital Twin to Support Energy Management and Smart Appliance Research.
Proceedings of the IEEE International Conference on Communications, 2023

SmartDSM: Towards User-Centric IoT Middleware Platform for Privacy-Focused Smart Systems.
Proceedings of the IEEE International Conference on Internet of Things and Intelligence Systems, 2023

2021
Low Voltage Warning System for Stand-Alone Metering Station Using AI on the Edge.
Proceedings of the Digital Interaction and Machine Intelligence - Proceedings of MIDI'2021, 2021

2020
A Framework to Support Creation of AI Applications for Low-Power WSN Nodes.
Proceedings of the Digital Interaction and Machine Intelligence - Proceedings of MIDI'2020, 2020

2019
PICO: A platform independent communications middleware for heterogeneous devices in smart grids.
Comput. Stand. Interfaces, 2019

2014
Tool-supported Requirements-based Topology Design for Wireless Sensor Networks.
Proceedings of the 2014 Federated Conference on Computer Science and Information Systems, 2014

2013
Sens4U: Wireless sensor network applications for environment monitoring made easy.
Proceedings of the 4th International Workshop on Software Engineering for Sensor Network Applications, 2013

2012
lmRNG: A Lightweight Pseudorandom Number Generator for Wireless Sensor Networks.
Proceedings of the SECRYPT 2012, 2012

Distributed Shared Memory as an Approach for Integrating WSNs and Cloud Computing.
Proceedings of the 5th International Conference on New Technologies, 2012

2011
Assessment of the feasibility of distributed shared memory and data consistency for wireless sensor networks.
PhD thesis, 2011

Symbiosis of a Lightweight ECC Security and Distributed Shared Memory Middleware in Wireless Sensor Networks.
Proceedings of the 30th IEEE Symposium on Reliable Distributed Systems Workshops, 2011

Cross-platform protocol development for sensor networks: lessons learned.
Proceedings of the 2nd Workshop on Software Engineering for Sensor Network Applications, 2011

2010
Short ECC - A Lightweight Security Approach for Wireless Sensor Networks.
Proceedings of the SECRYPT 2010, 2010

Body area network for first responders: a case study.
Proceedings of the 5th International ICST Conference on Body Area Networks, 2010

2009
Customizing sensor nodes and software for individual pervasive health applications.
Proceedings of the 3rd International Conference on Pervasive Computing Technologies for Healthcare, 2009

A cross-layer approach for data replication and gathering in decentralized long-living wireless sensor networks.
Proceedings of the International Symposium on Autonomous Decentralized Systems (ISADS 2009), 2009

tinyDSM: A highly reliable cooperative data storage for Wireless Sensor Networks.
Proceedings of the 2009 International Symposium on Collaborative Technologies and Systems, 2009

A Wireless Sensor Network Architecture for Homeland Security Application.
Proceedings of the Ad-Hoc, Mobile and Wireless Networks, 8th International Conference, 2009

2008
Public key cryptography empowered smart dust is affordable.
Int. J. Sens. Networks, 2008

In-network-aggregation as case study for a support tool reducing the complexity of designing secure wireless sensor networks.
Proceedings of the LCN 2008, 2008

2007
Crosslayer firewall interaction as a means to provide effective and efficient protection at mobile devices.
Comput. Commun., 2007

Flexible hardware reduction for elliptic curve cryptography in GF(2<i><sup>m</sup></i>).
Proceedings of the 2007 Design, Automation and Test in Europe Conference and Exposition, 2007

On Concealed Data Aggregation for WSNs.
Proceedings of the 4th IEEE Consumer Communications and Networking Conference, 2007

2006
Protecting privacy in e-cash schemes by securing hidden identity approaches against statistical attacks.
Internet Res., 2006

Efficient Protection of Mobile Devices by Cross Layer Interaction of Firewall Approaches.
Proceedings of the Wired/Wireless Internet Communications, 4th International Conference, 2006

How public key cryptography influences wireless sensor node lifetime.
Proceedings of the 4th ACM Workshop on Security of ad hoc and Sensor Networks, 2006

2005
Charged Location Aware Services.
Proceedings of the Wireless Information Systems, 2005

Charged Location Aware Services - A Privacy Analysis.
Proceedings of the 2005 International Conference on Mobile Business (ICMB 2005), 2005

2004
A location-aware Revocation Approach.
Proceedings of the 34. Jahrestagung der Gesellschaft für Informatik, 2004


  Loading...