Arno Wacker

Affiliations:
  • University of Kassel, Department of Electrical Engineering and Computer Science
  • University of Duisburg-Essen, Department of Computer Science and Applied Cognitive Science
  • University of Stuttgart, Institute for Parallel and Distributed Systems


According to our database1, Arno Wacker authored at least 67 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Comparing Nudges and Deceptive Patterns at a Technical Level.
Proceedings of the Workshop Mobilizing Research and Regulatory Action on Dark Patterns and Deceptive Design Practices (DDPCHI 2024) co-located with the CHI Conference on Human Factors in Computing Systems (CHI 2024), 2024

2023
Preface.
Proceedings of the 6th International Conference on Historical Cryptology, 2023

Disjoint Lookups in Kademlia for Random IDs.
Proceedings of the IEEE International Conference on Autonomic Computing and Self-Organizing Systems, 2023

2021
Applying Harary Graph Structures to the Overlay Network Kademlia.
Proceedings of the 30th International Conference on Computer Communications and Networks, 2021

2020
Decryption of historical manuscripts: the DECRYPT project.
Cryptologia, 2020

2019
Cryptanalysis of Enigma double indicators with hill climbing.
Cryptologia, 2019

Informatik mit Recht.
Proceedings of the 49. Jahrestagung der Gesellschaft für Informatik, 50 Jahre Gesellschaft für Informatik, 2019

2018
Löschen im Internet - rechtlich gefordert und technisch möglich!
Datenschutz und Datensicherheit, 2018

Ciphertext-only cryptanalysis of short Hagelin M-209 ciphertexts.
Cryptologia, 2018

A Decentralized Resilient Short-Term Cache for Messaging.
Proceedings of the Distributed Applications and Interoperable Systems, 2018

2017
Deciphering ADFGVX messages from the Eastern Front of World War I.
Cryptologia, 2017

Evaluating Connection Resilience for the Overlay Network Kademlia.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

k-rAC: a Fine-Grained k-Resilient Access Control Scheme for Distributed Hash Tables.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Vertrauensvolle E-Mail-Kommunikation.
Datenschutz und Datensicherheit, 2016

Unpopuläre E-Mail-Verschlüsselung - Auflösung des Henne-Ei-Problems.
Datenschutz und Datensicherheit, 2016

Cryptanalysis of Chaocipher and solution of Exhibit 6.
Cryptologia, 2016

Cryptanalysis of columnar transposition cipher with long keys.
Cryptologia, 2016

Ciphertext-only cryptanalysis of Hagelin M-209 pins and lugs.
Cryptologia, 2016

Automated Known-Plaintext Cryptanalysis of Short Hagelin M-209 Messages.
Cryptologia, 2016

k-rAC - a Fine-Grained k-Resilient Access Control Scheme for Distributed Hash Tables.
CoRR, 2016

Evaluating Connection Resilience for Self-Organized Distributed Cyber-Physical Systems.
CoRR, 2016

Towards Autonomous Self-Tests at Runtime.
Proceedings of the 2016 IEEE 1st International Workshops on Foundations and Applications of Self* Systems (FAS*W), 2016

Evaluating Connection Resilience for Self-Organizing Cyber-Physical Systems.
Proceedings of the 10th IEEE International Conference on Self-Adaptive and Self-Organizing Systems, 2016

2015
"Löschen" im Internet.
Datenschutz und Datensicherheit, 2015

A building block for awareness in technical systems: Online novelty detection and reaction with an application in intrusion detection.
Proceedings of the IEEE 7th International Conference on Awareness Science and Technology, 2015

SoftGap: A Multi Independent Levels of Security Cross-Domain Solution.
Proceedings of the 3rd International Conference on Future Internet of Things and Cloud, 2015

Simulating Cheated Results Dissemination for Volunteer Computing.
Proceedings of the 3rd International Conference on Future Internet of Things and Cloud, 2015

A Novel Approach to Data Revocation on the Internet.
Proceedings of the Data Privacy Management, and Security Assurance, 2015

Analysis and monitoring of hidden TCP traffic based on an open-source covert timing channel.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

A novel method for securing critical infrastructures by detecting hidden flows of data.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
Balancing the Online Life: Mobile Usage Scenarios and Strategies for a New Communication Paradigm.
IEEE Veh. Technol. Mag., 2014

CrypTool 2.0.
Datenschutz und Datensicherheit, 2014

Solving the Double Transposition Challenge with a Divide-and-Conquer Approach.
Cryptologia, 2014

Engineering and Mastering Interwoven Systems.
Proceedings of the ARCS 2014, 2014

The Future of Socio-Technical Design for Ubiquitous Computing Systems.
Proceedings of the Socio-technical Design of Ubiquitous Computing Systems, 2014

Understanding the Formation of Trust.
Proceedings of the Socio-technical Design of Ubiquitous Computing Systems, 2014

Ranking Cryptographic Algorithms.
Proceedings of the Socio-technical Design of Ubiquitous Computing Systems, 2014

2013
Recht auf Vergessen im Internet.
Datenschutz und Datensicherheit, 2013

A new approach for distributed and collaborative context prediction.
Proceedings of the 2013 IEEE International Conference on Pervasive Computing and Communications Workshops, 2013

A Concept for Securing Cyber-Physical Systems with Organic Computing Techniques.
Proceedings of the ARCS 2013, 2013

2012
Self-Stabilizing Micro Controller for Large-Scale Sensor Networks in Spite of Program Counter Corruptions Due to Soft Errors.
Proceedings of the 18th IEEE International Conference on Parallel and Distributed Systems, 2012

Understanding the Formation of Trust in IT Artifacts.
Proceedings of the International Conference on Information Systems, 2012

Mixing virtual and physical participation: The future of conference attendance?
Proceedings of the 2012 IEEE International Workshop on Haptic Audio Visual Environments and Games, 2012

NTALG - TCP NAT traversal with application-level gateways.
Proceedings of the 2012 IEEE Consumer Communications and Networking Conference (CCNC), 2012

An architecture for complex P2P systems.
Proceedings of the 2012 IEEE Consumer Communications and Networking Conference (CCNC), 2012

2011
Federating Websites with the Google Wave Protocol.
IEEE Internet Comput., 2011

SYNI - TCP Hole Punching Based on SYN Injection.
Proceedings of The Tenth IEEE International Symposium on Networking Computing and Applications, 2011

A New Protocol to Determine the NAT Characteristics of a Host.
Proceedings of the 25th IEEE International Symposium on Parallel and Distributed Processing, 2011

Detecting Opportunistic Cheaters in Volunteer Computing.
Proceedings of 20th International Conference on Computer Communications and Networks, 2011

Self-stabilizing embedded systems.
Proceedings of the 2011 workshop on Organic computing, 2011

Model-Driven Development of Self-organising Control Applications.
Proceedings of the Organic Computing - A Paradigm Shift for Complex Systems, 2011

2010
Towards peer-to-peer-based cryptanalysis.
Proceedings of the 35th Annual IEEE Conference on Local Computer Networks, 2010

2009
Towards Logical Clocks in P2P-based MMVEs.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2009

Fighting Cheating in P2P-based MMVEs with Disjoint Path Routing.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2009

Bootstrapping Peer-to-Peer Systems Using IRC.
Proceedings of the 18th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, 2009

Gears4Net.
Proceedings of the ICPPW 2009, 2009

2008
Key distribution schemes for resource constrained devices in wireless sensor networks.
PhD thesis, 2008

Towards an authentication service for Peer-to-Peer based Massively Multiuser Virtual Environments.
Int. J. Adv. Media Commun., 2008

A NAT Traversal Mechanism for Peer-To-Peer Networks.
Proceedings of the Proceedings P2P'08, 2008

Self-stabilizing Automata.
Proceedings of the Biologically-Inspired Collaborative Computing, 2008

Bootstrapping in Peer-to-Peer Systems.
Proceedings of the 14th International Conference on Parallel and Distributed Systems, 2008

Prototyping sensor-actuator networks for home automation.
Proceedings of the workshop on Real-world wireless sensor networks, 2008

2007
Decentralized Bootstrapping in Pervasive Applications.
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications, 2007

Requirements of Peer-to-Peer-based Massively Multiplayer Online Gaming.
Proceedings of the Seventh IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2007), 2007

2005
A new approach for establishing pairwise keys for securing wireless sensor networks.
Proceedings of the 3rd International Conference on Embedded Networked Sensor Systems, 2005

2004
A Fault-Tolerant Key-Distribution Scheme for Securing Wireless Ad Hoc Networks.
Proceedings of the Pervasive Computing, 2004

A key-distribution scheme for wireless home automation networks.
Proceedings of the 1st IEEE Consumer Communications and Networking Conference, 2004


  Loading...