Arno Wacker
Arno Wacker
Bundeswehr University Munich, Germany, Computer Science (Privacy & Compliance))
Verified email at - Homepage
Cited by
Cited by
Understanding the formation of trust in IT artifacts
M Söllner, A Hoffmann, H Hoffmann, A Wacker, JM Leimeister
Association for Information Systems, 2012
Engineering and mastering interwoven systems
S Tomforde, J Hähner, H Seebach, W Reif, B Sick, A Wacker, I Scholtes
ARCS 2014; 2014 Workshop Proceedings on Architecture of Computing Systems, 1-8, 2014
Requirements of peer-to-peer-based massively multiplayer online gaming
G Schiele, R Suselbeck, A Wacker, J Hahner, C Becker, T Weis
Seventh IEEE International Symposium on Cluster Computing and the Grid …, 2007
Prototyping sensor-actuator networks for home automation
M Gauger, D Minder, PJ Marron, A Wacker, A Lachenmann
Proceedings of the workshop on Real-world wireless sensor networks, 56-60, 2008
A nat traversal mechanism for peer-to-peer networks
A Wacker, G Schiele, S Holzapfel, T Weis
2008 Eighth International Conference on Peer-to-Peer Computing, 81-83, 2008
A new approach for establishing pairwise keys for securing wireless sensor networks
A Wacker, M Knoll, T Heiber, K Rothermel
Proceedings of the 3rd international conference on Embedded networked sensor …, 2005
A building block for awareness in technical systems: Online novelty detection and reaction with an application in intrusion detection
C Gruhl, B Sick, A Wacker, S Tomforde, J Hähner
2015 IEEE 7th International Conference on Awareness Science and Technology …, 2015
Decentralized bootstrapping in pervasive applications
M Knoll, A Wacker, G Schiele, T Weis
Fifth Annual IEEE International Conference on Pervasive Computing and …, 2007
Bootstrapping in peer-to-peer systems
M Knoll, A Wacker, G Schiele, T Weis
2008 14th IEEE International Conference on Parallel and Distributed Systems …, 2008
A key-distribution scheme for wireless home automation networks
A Wacker, T Heiber, H Cermann
First IEEE Consumer Communications and Networking Conference, 2004. CCNC …, 2004
Socio-technical design of ubiquitous computing systems
K David, K Geihs, JM Leimeister, A Roßnagel, L Schmidt, G Stumme, ...
Springer, 2014
Recht auf Vergessen im Internet
S Jandt, O Kieselmann, A Wacker
Datenschutz und Datensicherheit-DuD 37 (4), 235-241, 2013
Balancing the online life: Mobile usage scenarios and strategies for a new communication paradigm
K David, G Bieling, D Bohnstedt, S Jandt, S Ohly, A Robnagel, A Schmitt, ...
ieee veHiculAR tecHnOlOGy mAGAzine 9 (3), 72-79, 2014
Solving the double transposition challenge with a divide-and-conquer approach
G Lasry, N Kopal, A Wacker
Cryptologia 38 (3), 197-214, 2014
Towards an authentication service for peer-to-peer based massively multiuser virtual environments
A Wacker, G Schiele, S Schuster, T Weis
International journal of advanced media and communication 2 (4), 364-379, 2008
Decryption of historical manuscripts: the DECRYPT project
B Megyesi, B Esslinger, A Fornés, N Kopal, B Láng, G Lasry, K Leeuw, ...
Cryptologia 44 (6), 545-559, 2020
Evaluating connection resilience for the overlay network Kademlia
H Heck, O Kieselmann, A Wacker
2017 IEEE 37th International Conference on Distributed Computing Systems …, 2017
Mixing virtual and physical participation: The future of conference attendance?
S Shirmohammadi, SY Hu, WT Ooi, G Schiele, A Wacker
2012 IEEE International Workshop on Haptic Audio Visual Environments and …, 2012
Deciphering ADFGVX messages from the Eastern Front of World War I
G Lasry, I Niebel, N Kopal, A Wacker
Cryptologia 41 (2), 101-136, 2017
A concept for securing cyber-physical systems with organic computing techniques
J Hähner, S Rudolph, S Tomforde, D Fisch, B Sick, N Kopal, A Wacker
26th International Conference on Architecture of Computing Systems 2013, 1-13, 2013
The system can't perform the operation now. Try again later.
Articles 1–20