Seguir
Arno Wacker
Arno Wacker
Bundeswehr University Munich, Germany, Computer Science (Privacy & Compliance))
Dirección de correo verificada de unibw.de - Página principal
Título
Citado por
Citado por
Año
Understanding the formation of trust in IT artifacts
M Söllner, A Hoffmann, H Hoffmann, A Wacker, JM Leimeister
1372012
Requirements of peer-to-peer-based massively multiplayer online gaming
G Schiele, R Suselbeck, A Wacker, J Hahner, C Becker, T Weis
Seventh IEEE International Symposium on Cluster Computing and the Grid …, 2007
812007
Engineering and mastering interwoven systems
S Tomforde, J Hähner, H Seebach, W Reif, B Sick, A Wacker, I Scholtes
ARCS 2014; 2014 Workshop Proceedings on Architecture of Computing Systems, 1-8, 2014
752014
Prototyping sensor-actuator networks for home automation
M Gauger, D Minder, PJ Marron, A Wacker, A Lachenmann
Proceedings of the workshop on Real-world wireless sensor networks, 56-60, 2008
652008
A nat traversal mechanism for peer-to-peer networks
A Wacker, G Schiele, S Holzapfel, T Weis
2008 Eighth International Conference on Peer-to-Peer Computing, 81-83, 2008
522008
A building block for awareness in technical systems: Online novelty detection and reaction with an application in intrusion detection
C Gruhl, B Sick, A Wacker, S Tomforde, J Hähner
2015 IEEE 7th International Conference on Awareness Science and Technology …, 2015
442015
A new approach for establishing pairwise keys for securing wireless sensor networks
A Wacker, M Knoll, T Heiber, K Rothermel
Proceedings of the 3rd international conference on Embedded networked sensor …, 2005
442005
Decryption of historical manuscripts: the decrypt project
B Megyesi, B Esslinger, A Fornés, N Kopal, B Láng, G Lasry, K Leeuw, ...
Cryptologia 44 (6), 545-559, 2020
412020
Decentralized bootstrapping in pervasive applications
M Knoll, A Wacker, G Schiele, T Weis
Fifth Annual IEEE International Conference on Pervasive Computing and …, 2007
322007
Recht auf Vergessen im Internet: Diskrepanz zwischen rechtlicher Zielsetzung und technischer Realisierbarkeit?
S Jandt, O Kieselmann, A Wacker
Datenschutz und Datensicherheit-DuD 37 (4), 235-241, 2013
302013
Bootstrapping in peer-to-peer systems
M Knoll, A Wacker, G Schiele, T Weis
2008 14th IEEE International Conference on Parallel and Distributed Systems …, 2008
302008
Socio-technical design of ubiquitous computing systems
K David, K Geihs, JM Leimeister, A Roßnagel, L Schmidt, G Stumme, ...
Springer, 2014
252014
A key-distribution scheme for wireless home automation networks
A Wacker, T Heiber, H Cermann
First IEEE Consumer Communications and Networking Conference, 2004. CCNC …, 2004
242004
Solving the double transposition challenge with a divide-and-conquer approach
G Lasry, N Kopal, A Wacker
Cryptologia 38 (3), 197-214, 2014
222014
Balancing the online life: Mobile usage scenarios and strategies for a new communication paradigm
K David, G Bieling, D Bohnstedt, S Jandt, S Ohly, A Robnagel, A Schmitt, ...
ieee veHiculAR tecHnOlOGy mAGAzine 9 (3), 72-79, 2014
212014
Cryptanalysis of columnar transposition cipher with long keys
G Lasry, N Kopal, A Wacker
Cryptologia 40 (4), 374-398, 2016
202016
Evaluating connection resilience for the overlay network Kademlia
H Heck, O Kieselmann, A Wacker
2017 IEEE 37th International Conference on Distributed Computing Systems …, 2017
192017
Deciphering ADFGVX messages from the eastern front of world war I
G Lasry, I Niebel, N Kopal, A Wacker
Cryptologia 41 (2), 101-136, 2017
182017
CrypTool 2.0: Open-Source Kryptologie für Jedermann
N Kopal, O Kieselmann, A Wacker, B Esslinger
Datenschutz und Datensicherheit-DuD 38 (10), 701-708, 2014
182014
Mixing virtual and physical participation: The future of conference attendance?
S Shirmohammadi, SY Hu, WT Ooi, G Schiele, A Wacker
2012 IEEE International Workshop on Haptic Audio Visual Environments and …, 2012
162012
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20