Arno Wacker
Arno Wacker
Bundeswehr University Munich, Germany, Computer Science (Privacy & Compliance))
Bestätigte E-Mail-Adresse bei - Startseite
Zitiert von
Zitiert von
Understanding the formation of trust in IT artifacts
M Söllner, A Hoffmann, H Hoffmann, A Wacker, JM Leimeister
Engineering and mastering interwoven systems
S Tomforde, J Hähner, H Seebach, W Reif, B Sick, A Wacker, I Scholtes
ARCS 2014; 2014 Workshop Proceedings on Architecture of Computing Systems, 1-8, 2014
Requirements of peer-to-peer-based massively multiplayer online gaming
G Schiele, R Suselbeck, A Wacker, J Hahner, C Becker, T Weis
Seventh IEEE International Symposium on Cluster Computing and the Grid …, 2007
Epithelial chloride transport by CFTR requires TMEM16A
R Benedetto, J Ousingsawat, P Wanitchakool, Y Zhang, MJ Holtzman, ...
Scientific reports 7 (1), 1-13, 2017
Prototyping sensor-actuator networks for home automation
M Gauger, D Minder, PJ Marron, A Wacker, A Lachenmann
Proceedings of the workshop on Real-world wireless sensor networks, 56-60, 2008
A nat traversal mechanism for peer-to-peer networks
A Wacker, G Schiele, S Holzapfel, T Weis
2008 Eighth International Conference on Peer-to-Peer Computing, 81-83, 2008
A new approach for establishing pairwise keys for securing wireless sensor networks
A Wacker, M Knoll, T Heiber, K Rothermel
Proceedings of the 3rd international conference on Embedded networked sensor …, 2005
Decentralized bootstrapping in pervasive applications
M Knoll, A Wacker, G Schiele, T Weis
Fifth Annual IEEE International Conference on Pervasive Computing and …, 2007
Bootstrapping in peer-to-peer systems
M Knoll, A Wacker, G Schiele, T Weis
2008 14th IEEE International Conference on Parallel and Distributed Systems …, 2008
A building block for awareness in technical systems: Online novelty detection and reaction with an application in intrusion detection
C Gruhl, B Sick, A Wacker, S Tomforde, J Hähner
2015 IEEE 7th International Conference on Awareness Science and Technology …, 2015
A key-distribution scheme for wireless home automation networks
A Wacker, T Heiber, H Cermann
First IEEE Consumer Communications and Networking Conference, 2004. CCNC …, 2004
Socio-technical Design of Ubiquitous Computing Systems
K David, K Geihs, JM Leimeister, A Roßnagel, L Schmidt, G Stumme, ...
Springer International Publishing, 2014
Recht auf Vergessen im Internet
S Jandt, O Kieselmann, A Wacker
Datenschutz und Datensicherheit-DuD 37 (4), 235-241, 2013
Solving the double transposition challenge with a divide-and-conquer approach
G Lasry, N Kopal, A Wacker
Cryptologia 38 (3), 197-214, 2014
Balancing the online life: Mobile usage scenarios and strategies for a new communication paradigm
K David, G Bieling, D Bohnstedt, S Jandt, S Ohly, A Robnagel, A Schmitt, ...
ieee veHiculAR tecHnOlOGy mAGAzine 9 (3), 72-79, 2014
Towards an authentication service for peer-to-peer based massively multiuser virtual environments
A Wacker, G Schiele, S Schuster, T Weis
International journal of advanced media and communication 2 (4), 364-379, 2008
Evaluating connection resilience for the overlay network Kademlia
H Heck, O Kieselmann, A Wacker
2017 IEEE 37th International Conference on Distributed Computing Systems …, 2017
Deciphering ADFGVX messages from the Eastern Front of World War I
G Lasry, I Niebel, N Kopal, A Wacker
Cryptologia 41 (2), 101-136, 2017
A concept for securing cyber-physical systems with organic computing techniques
J Hähner, S Rudolph, S Tomforde, D Fisch, B Sick, N Kopal, A Wacker
26th International Conference on Architecture of Computing Systems 2013, 1-13, 2013
A fault-tolerant key-distribution scheme for securing wireless ad hoc networks
A Wacker, T Heiber, H Cermann, PJ Marrón
International Conference on Pervasive Computing, 194-212, 2004
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20