Arno Wacker
Arno Wacker
Bundeswehr University Munich, Germany, Computer Science (Privacy & Compliance))
Bestätigte E-Mail-Adresse bei - Startseite
Zitiert von
Zitiert von
Understanding the formation of trust in IT artifacts
M Söllner, A Hoffmann, H Hoffmann, A Wacker, JM Leimeister
Requirements of peer-to-peer-based massively multiplayer online gaming
G Schiele, R Suselbeck, A Wacker, J Hahner, C Becker, T Weis
Seventh IEEE International Symposium on Cluster Computing and the Grid …, 2007
Engineering and mastering interwoven systems
S Tomforde, J Hähner, H Seebach, W Reif, B Sick, A Wacker, I Scholtes
ARCS 2014; 2014 Workshop Proceedings on Architecture of Computing Systems, 1-8, 2014
Prototyping sensor-actuator networks for home automation
M Gauger, D Minder, PJ Marron, A Wacker, A Lachenmann
Proceedings of the workshop on Real-world wireless sensor networks, 56-60, 2008
A nat traversal mechanism for peer-to-peer networks
A Wacker, G Schiele, S Holzapfel, T Weis
2008 Eighth International Conference on Peer-to-Peer Computing, 81-83, 2008
A building block for awareness in technical systems: Online novelty detection and reaction with an application in intrusion detection
C Gruhl, B Sick, A Wacker, S Tomforde, J Hähner
2015 IEEE 7th International Conference on Awareness Science and Technology …, 2015
A new approach for establishing pairwise keys for securing wireless sensor networks
A Wacker, M Knoll, T Heiber, K Rothermel
Proceedings of the 3rd international conference on Embedded networked sensor …, 2005
Decryption of historical manuscripts: the decrypt project
B Megyesi, B Esslinger, A Fornés, N Kopal, B Láng, G Lasry, K Leeuw, ...
Cryptologia 44 (6), 545-559, 2020
Decentralized bootstrapping in pervasive applications
M Knoll, A Wacker, G Schiele, T Weis
Fifth Annual IEEE International Conference on Pervasive Computing and …, 2007
Recht auf Vergessen im Internet: Diskrepanz zwischen rechtlicher Zielsetzung und technischer Realisierbarkeit?
S Jandt, O Kieselmann, A Wacker
Datenschutz und Datensicherheit-DuD 37 (4), 235-241, 2013
Bootstrapping in peer-to-peer systems
M Knoll, A Wacker, G Schiele, T Weis
2008 14th IEEE International Conference on Parallel and Distributed Systems …, 2008
Socio-technical design of ubiquitous computing systems
K David, K Geihs, JM Leimeister, A Roßnagel, L Schmidt, G Stumme, ...
Springer, 2014
A key-distribution scheme for wireless home automation networks
A Wacker, T Heiber, H Cermann
First IEEE Consumer Communications and Networking Conference, 2004. CCNC …, 2004
Solving the double transposition challenge with a divide-and-conquer approach
G Lasry, N Kopal, A Wacker
Cryptologia 38 (3), 197-214, 2014
Balancing the online life: Mobile usage scenarios and strategies for a new communication paradigm
K David, G Bieling, D Bohnstedt, S Jandt, S Ohly, A Robnagel, A Schmitt, ...
ieee veHiculAR tecHnOlOGy mAGAzine 9 (3), 72-79, 2014
Cryptanalysis of columnar transposition cipher with long keys
G Lasry, N Kopal, A Wacker
Cryptologia 40 (4), 374-398, 2016
Evaluating connection resilience for the overlay network Kademlia
H Heck, O Kieselmann, A Wacker
2017 IEEE 37th International Conference on Distributed Computing Systems …, 2017
Deciphering ADFGVX messages from the eastern front of world war I
G Lasry, I Niebel, N Kopal, A Wacker
Cryptologia 41 (2), 101-136, 2017
CrypTool 2.0: Open-Source Kryptologie für Jedermann
N Kopal, O Kieselmann, A Wacker, B Esslinger
Datenschutz und Datensicherheit-DuD 38 (10), 701-708, 2014
Evaluating connection resilience for self-organizing cyber-physical systems
H Heck, O Kieselmann, A Wacker
2016 IEEE 10th international conference on Self-Adaptive and Self-Organizing …, 2016
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20