Understanding the formation of trust in IT artifacts M Söllner, A Hoffmann, H Hoffmann, A Wacker, JM Leimeister | 145 | 2012 |
Requirements of peer-to-peer-based massively multiplayer online gaming G Schiele, R Suselbeck, A Wacker, J Hahner, C Becker, T Weis Seventh IEEE International Symposium on Cluster Computing and the Grid …, 2007 | 82 | 2007 |
Engineering and mastering interwoven systems S Tomforde, J Hähner, H Seebach, W Reif, B Sick, A Wacker, I Scholtes ARCS 2014; 2014 Workshop Proceedings on Architecture of Computing Systems, 1-8, 2014 | 72 | 2014 |
Prototyping sensor-actuator networks for home automation M Gauger, D Minder, PJ Marron, A Wacker, A Lachenmann Proceedings of the workshop on Real-world wireless sensor networks, 56-60, 2008 | 67 | 2008 |
A nat traversal mechanism for peer-to-peer networks A Wacker, G Schiele, S Holzapfel, T Weis 2008 Eighth International Conference on Peer-to-Peer Computing, 81-83, 2008 | 53 | 2008 |
Decryption of historical manuscripts: the DECRYPT project B Megyesi, B Esslinger, A Fornés, N Kopal, B Láng, G Lasry, K Leeuw, ... Cryptologia 44 (6), 545-559, 2020 | 49 | 2020 |
A building block for awareness in technical systems: Online novelty detection and reaction with an application in intrusion detection C Gruhl, B Sick, A Wacker, S Tomforde, J Hähner 2015 IEEE 7th International Conference on Awareness Science and Technology …, 2015 | 45 | 2015 |
A new approach for establishing pairwise keys for securing wireless sensor networks A Wacker, M Knoll, T Heiber, K Rothermel Proceedings of the 3rd international conference on Embedded networked sensor …, 2005 | 45 | 2005 |
Decentralized bootstrapping in pervasive applications M Knoll, A Wacker, G Schiele, T Weis Fifth Annual IEEE International Conference on Pervasive Computing and …, 2007 | 32 | 2007 |
Recht auf Vergessen im Internet: Diskrepanz zwischen rechtlicher Zielsetzung und technischer Realisierbarkeit? S Jandt, O Kieselmann, A Wacker Datenschutz und Datensicherheit-DuD 37 (4), 235-241, 2013 | 31 | 2013 |
Bootstrapping in peer-to-peer systems M Knoll, A Wacker, G Schiele, T Weis 2008 14th IEEE International Conference on Parallel and Distributed Systems …, 2008 | 30 | 2008 |
Socio-technical design of ubiquitous computing systems K David, K Geihs, JM Leimeister, A Roßnagel, L Schmidt, G Stumme, ... Springer International Publishing, 2014 | 27 | 2014 |
A key-distribution scheme for wireless home automation networks A Wacker, T Heiber, H Cermann First IEEE Consumer Communications and Networking Conference, 2004. CCNC …, 2004 | 24 | 2004 |
Solving the double transposition challenge with a divide-and-conquer approach G Lasry, N Kopal, A Wacker Cryptologia 38 (3), 197-214, 2014 | 22 | 2014 |
Balancing the online life: Mobile usage scenarios and strategies for a new communication paradigm K David, G Bieling, D Bohnstedt, S Jandt, S Ohly, A Robnagel, A Schmitt, ... ieee veHiculAR tecHnOlOGy mAGAzine 9 (3), 72-79, 2014 | 21 | 2014 |
Cryptanalysis of columnar transposition cipher with long keys G Lasry, N Kopal, A Wacker Cryptologia 40 (4), 374-398, 2016 | 20 | 2016 |
Evaluating connection resilience for the overlay network Kademlia H Heck, O Kieselmann, A Wacker 2017 IEEE 37th International Conference on Distributed Computing Systems …, 2017 | 19 | 2017 |
Deciphering ADFGVX messages from the eastern front of world war I G Lasry, I Niebel, N Kopal, A Wacker Cryptologia 41 (2), 101-136, 2017 | 18 | 2017 |
Evaluating connection resilience for self-organizing cyber-physical systems H Heck, O Kieselmann, A Wacker 2016 IEEE 10th international conference on Self-Adaptive and Self-Organizing …, 2016 | 18 | 2016 |
CrypTool 2.0: Open-Source Kryptologie für Jedermann N Kopal, O Kieselmann, A Wacker, B Esslinger Datenschutz und Datensicherheit-DuD 38 (10), 701-708, 2014 | 18 | 2014 |