Die Paper, die als PDF zum Herunterladen zur Verfügung stehen, beziehen sich auf die ursprünglich eingereichte Version und können (aufgrund von Urheberrechtsbeschränkungen) von der finalen Fassung abweichen.

2024

  • Schlolaut, M., Kieselmann, O.  & Wacker, A., "Comparing Nudges and Deceptive Patterns at a Technical Level", Mobilizing Research and Regulatory Action on Dark Patterns and Deceptive Design Practices Workshop at CHI conference on Human Factors in Computing Systems, Honolulu, HI, May 12, 2024
  • Kleine, S. & Müller, K., "On the non-commutative Iwasawa main conjecture for voltage covers of graphs"; to appear in the Israel Journal of Mathematics (29 pp.)
  • Kleine, S. & Müller, K., "On the growth of the Jacobians in  Z p l -voltage covers of graphs";  Algebraic Combinatorics 7:4, 1011-1038, DOI: 10.5802/alco.366 (2024)

2023

  • Heck, H. & Wacker. A., "Disjoint Lookups in Kademlia for Random IDs," 2023 IEEE International Conference on Autonomic Computing and Self-Organizing Systems Companion (ACSOS-C), Toronto, ON, Canada, 2023, pp. 47-52, DOI: 10.1109/ACSOS-C58168.2023.00035 (2023)

2021

  • Heck, H. & Wacker, A.: Applying Harary Graph Structures to the Overlay Network Kademlia. 2021 International Conference on Computer Communications and Networks (ICCCN). DOI: 10.1109/ICCCN52240.2021.9522261, IEEE, pp. 1-8 (2021)
    [URL]

2020

  • Megyesi, B., Esslinger, B., Fornés, A., Kopal, N., Láng, B., Lasry, G., de Leeuw, K., Pettersson, E., Wacker, A. & Waldispühl, M.: Decryption of Historical Manuscripts: the DECRYPT project. Cryptologia. DOI: 10.1080/01611194.2020.1716410 (2020)
    [URL] [PDF]

2019

  • Lasry, G., Kopal, N. & Wacker, A.: Cryptanalysis of Enigma Double Indicators with Hill Climbing. Cryptologia 43:4, 267-292, DOI: 10.1080/01611194.2018.1551253 (2019)
    [URL] [PDF]

2018

  • Lasry, G., Kopal, N., Wacker, A.: Ciphertext-Only Cryptanalysis of Short Hagelin M-209 Ciphertexts. Cryptologia 42:6, 485-513, DOI: 10.1080/01611194.2018.1428836 (2018)
    [URL] [PDF]
  • Heck, H., Kieselmann, O., Kopal, N., Wacker, A.: A Decentralized Resilient Short-Term Cache for Messaging. IFIP International Conference on Distributed Applications and Interoperable Systems (DAIS). pp. 110-121. Springer (2018)
    [URL] [PDF]
  • Kieselmann, O., Wacker, A.: Löschen im Internet – rechtlich gefordert und technisch möglich! Datenschutz und Datensicherheit (DuD). 42/7, 437-441 (2018)
    [URL] [PDF]
  • Kopal, N.: Secure Volunteer Computing for Distributed Cryptanalysis. kassel university press GmbH (2018)
    [URL] [PDF]
  • Lasry, G.: A Methodology for the Cryptanalysis of Classical Ciphers with Search Metaheuristics, Kassel University Press. kassel university press (2018)
    [URL] [PDF]
  • Kieselmann, O.: Data Revocation on the Internet. kassel university press (2018)
    [URL] [PDF]

2017

  • Kopal, N., Wander, M., Konze, C., Heck, H.: Adaptive Cheat Detection in Decentralized Volunteer Computing with Untrusted Nodes. IFIP International Conference on Distributed Applications and Interoperable Systems (DAIS). pp. 192-205. Springer (2017)
    [URL] [PDF]
  • Kopal, N., Heck, H., Wacker, A.: Simulating Cheated Results Acceptance Rates for Gossip-Based Volunteer Computing. International Journal of Mobile Network Design and Innovation. 7, 56-67 (2017)
    [URL]
  • Gruhl, C., Beer, F., Heck, H., Sick, B., Buehler, U., Wacker, A., Tomforde, S.: A Concept for Intelligent Collaborative Network Intrusion Detection. ARCS 2017; 30th International Conference on Architecture of Computing Systems; Proceedings of. p. 1--8. VDE (2017)
    [URL] [PDF]
  • Kieselmann, O., Wacker, A., Schiele, G.: k-rAC – a Fine-Grained k-Resilient Access Control Scheme for Distributed Hash Tables. Proceedings of the 12th International Conference on Availability, Reliability and Security, ARES '17, Reggio Calabria, Italy. pp. 43:1-43:10. ACM, New York, NY, USA (2017)
    [URL] [PDF]
  • Heck, H., Kieselmann, O., Wacker, A.: Evaluating Connection Resilience for the Overlay Network Kademlia. 37th IEEE International Conference on Distributed Computing Systems (ICDCS 2017). pp. 2581-2584. IEEE Computer Society, Atlanta, GA, USA (2017)
    [URL] [PDF]

2016

  • Lasry, G., Rubin, M., Kopal, N., Wacker, A.: Cryptanalysis of Chaocipher and Solution of Exhibit 6. Cryptologia. 1-28 (2016)
    [URL] [PDF]
  • Heck, H.: Towards Self-Tests in Distributed Cyber-Physical Systems. Organic Computing – Doctoral Dissertation Colloquium. p. 103-109. kassel university press (2016)
    [URL]
  • Wittmaack, L., Esslinger, B., Schmidt, L., Strenge, B., Wacker, A.: Vertrauensvolle E-Mail-Kommunikation. Technische Grundlagen der E-Mail(-Verschlüsselung). Datenschutz und Datensicherheit (DuD). 40, 271-277 (2016)
    [URL] [PDF]
  • Lasry, G., Niebel, I., Kopal, N., Wacker, A.: Deciphering ADFGVX Messages from World War I Eastern Front. Cryptologia. 1-36 (2016)
    [URL] [PDF]
  • Heck, H., Gruhl, C., Rudolph, S., Wacker, A., Sick, B., Haehner, J.: Multi-k-resilience in distributed adaptive cyber-physical systems. ARCS 2016; 29th International Conference on Architecture of Computing Systems; Proceedings of. pp. 1-8. VDE (2016)
    [URL] [PDF]
  • Heck, H., Kieselmann, O., Wacker, A.: Evaluating Connection Resilience for Self-Organized Cyber-Physical Systems. 2016 IEEE 10th International Conference on Self-Adaptive and Self-Organizing Systems (SASO 2016). IEEE Computer Society (2016)
    [URL] [PDF]
  • Esslinger, B., Schmidt, L., Strenge, B., Wacker, A.: Unpopuläre E-Mail-Verschlüsselung – Auflösung des Henne-Ei-Problems. Datenschutz und Datensicherheit. 40, 283–289 (2016)
    [URL] [PDF]
  • Heck, H., Rudolph, S., Gruhl, C., Wacker, A., Hähner, J., Sick, B., Tomforde, S.: Towards Autonomous Self-Tests at Runtime. Foundations and Applications of Self* Systems, IEEE International Workshops on. pp. 98-99. IEEE (2016)
    [URL] [PDF]
  • Lasry, G., Kopal, N., Wacker, A.: Cryptanalysis of the Columnar Transposition Cipher with Long Keys. Cryptologia. 1-25 (2016)
    [URL] [PDF]

2015

  • Liguori, A., Benedetto, F., Giunta, G., Kopal, N., Wacker, A.: SoftGap: a Multi Independent Levels of Security Cross-Domain Solution. 1st International Workshop on Signal Processing for Secure Communications (SP4SC-2015), held in conjunction with 3rd International Conference on Future Internet of Things and Cloud (FiCloud 2015). IEEE, Rome, Italy (2015)
    [URL] [PDF]
  • Heck, H., Edenhofer, S., Gruhl, C., Lund, A., Shuka, R., Hähner, J.: On the Application Possibilities of Organic Computing Principles in Socio-technical Systems. In: Sick, B. and Tomforde, S. (eds.) Organic Computing: Doctoral Dissertation Colloquium 2015. Kassel University Press GmbH (2015)
  • Kopal, N., Kieselmann, O., Wacker, A.: Simulating Cheated-Results-Dissemination for Volunteer Computing. 1st International Workshop on Signal Processing for Secure Communications (SP4SC-2015), held in conjunction with 3rd International Conference on Future Internet of Things and Cloud (FiCloud 2015). IEEE, Rome, Italy (2015)
    [URL] [PDF]
  • Kopal, N.: An Architecture for Creating a Secure Unstructured Peer-To-Peer-Based Volunteer Computing Cloud. In: Sick, B. and Tomforde, S. (eds.) Organic Computing: Doctoral Dissertation Colloquium 2015. Kassel University Press GmbH. (2015)
    [URL]
  • Liguori, A., Benedetto, F., Giunta, G., Kopal, N., Wacker, A.: Analysis and Monitoring of Hidden TCP Traffic Based on an Open-Source Covert Timing Channel. 1st IEEE Workshop on Security and Privacy in Cybermatics (SPiCy 2015), held in conjunction with 3rd International Conference on Communications and Network Security (IEEE CNS 2015). pp. 667-674. IEEE (2015)
    [URL] [PDF]
  • Benedetto, F., Giunta, G., Liguori, A., Wacker, A.: A Novel Method for Securing Critical Infrastructures by Detecting Hidden Flows of Data. Communications and Network Security (CNS), 2015 IEEE Conference on. pp. 648-654. IEEE (2015)
    [URL] [PDF]
  • Kieselmann, O., Kopal, N., Wacker, A.: "Löschen" im Internet. Ein neuer Ansatz für die technische Unterstützung des Rechts auf Löschen. Datenschutz und Datensicherheit (DuD). 39, 31-36 (2015)
    [URL] [PDF]
  • Heck, H.: Towards a k-Resilient Data Dissemination Mechanism for Peer-to-Peer Networks. In: Sick, B. and Tomforde, S. (eds.) Organic Computing: Doctoral Dissertation Colloquium 2015. p. 65. Kassel University Press GmbH (2015)
    [URL]
  • Gruhl, C., Sick, B., Wacker, A., Tomforde, S., Hähner, J.: A Building Block for Awareness in Technical Systems: Online Novelty Detection and Reaction With an Application in Intrusion Detection. Awareness Science and Technology (iCAST), 2015 IEEE 7th International Conference on. p. 194-200. IEEE, Qinhuangdao, China (2015)
    [URL] [PDF]
  • Lasry, G., Kopal, N.I., Wacker, A.: Ciphertext-Only Cryptanalysis of Hagelin M-209 Pins and Lugs. Cryptologia. 1-36 (2015)
    [URL] [PDF]
  • Rudolph, S., Tomforde, S., Sick, B., Heck, H., Wacker, A., Haehner, J.: An Online Influence Detection Algorithm for Organic Computing Systems. Architecture of Computing Systems. Proceedings, ARCS 2015-The 28th International Conference on Architecture of Computing Systems – ARCS Workshops. pp. 1-8. VDE Verlag (2015)
    [URL] [PDF]
  • Esslinger, B., Wacker, A.: IT-Sicherheit. In: Laudon, K.C., Laudon, J.P., Schoder, D., and eds., (eds.) Wirtschaftsinformatik: Eine Einführung (Pearson Studium - Economic BWL). pp. pp. 962–1061. Hallbergmoos, Germany: Pearson Deutschland GmbH (2015)
    [URL]
  • Calma, A., Jänicke, M., Kantert, J., Kopal, N., Siefert, F., Tomforde, S.: Horizontal Integration of Organic Computing and Control Theory Concepts. In: Sick, B. and Tomforde, S. (eds.) Organic Computing: Doctoral Dissertation Colloquium 2015. Kassel University Press GmbH (2015)
  • Kieselmann, O., Kopal, N., Wacker, A.: A Novel Approach to Data Revocation on the Internet. 10th DPM International Workshop on Data Privacy Management (DPM 2015), co-located with 20th European Symposium on Research in Computer Security (ESORICS 2015). p. 134-149. Vienna, Austria (2015)
    [URL] [PDF]
  • Lasry, G., Kopal, N., Wacker, A.: Automated Known-Plaintext Cryptanalysis of Short Hagelin M-209 Messages. Cryptologia. 1-21 (2015)
    [URL] [PDF]

2014

  • Kieselmann, O., Kopal, N., Wacker, A.: Ranking Cryptographic Algorithms. In: David, K., Geihs, K., Leimeister, J.M., Roßnagel, A., Schmidt, L., Stumme, G., and Wacker, A. (eds.) Socio-technical Design of Ubiquitous Computing Systems. pp. 151-171. Springer, Berlin (2014)
    [URL
  • Kopal, N., Kieselmann, O., Wacker, A.: Self-Organized Volunteer Computing. In: Sick, B. and Tomforde, S. (eds.) Organic Computing: Doctoral Dissertation Colloquium 2014. pp. 129-139. Kassel University Press GmbH (2014)
    [URL]
  • Kopal, N., Kieselmann, O., Wacker, A., Esslinger, B.: CrypTool 2.0. Open-Source Kryptologie für Jedermann. Datenschutz und Datensicherheit (DuD). 701 - 708 (2014)
    [URL] [PDF]
  • Tomforde, S., Hähner, J., Seebach, S., Reif, W., Sick, B., Wacker, A., Scholtes, I.: Self-Optimisation in Autonomic and Organic Computing Systems. 2nd International Workshop on "Self-Optimisation in Autonomic and Organic Computing Systems" (SAOS'14). Lübeck (2014)
  • Behrenbruch, K., Kieselmann, O., Schuldt, M., Söllner, M., Schmidt, L.: System Evaluation. In: David, K., Geihs, K., Leimeister, J.M., Roßnagel, A., Schmidt, L., Stumme, G., and Wacker, A. (eds.) Socio-technical Design of Ubiquitous Computing Systems. pp. 297-319. Springer, Berlin (2014)
    [URL]
  • David, K., Bieling, G., Böhnstedt, D., Jandt, S., Ohly, S., Roßnagel, A., Schmitt, A., Steinmetz, R., Stock-Homburg, R., Wacker, A.: Facilitating Work-Life Balance in an “Always-Online”-Society – Mobile Usage Scenarios and Strategies for a New Communication Paradigm. IEEE VT Magazine (2014)
  • David, K., Geihs, K., Leimeister, J.M., Roßnagel, A., Schmidt, L., Stumme, G., Wacker, A. eds: Socio-technical Design of Ubiquitous Computing Systems. Springer, Berlin (2014)
    [URL]
  • Lasry, G., Kopal, N., Wacker, A.: Solving the Double Transposition Challenge with a Divide and Conquer Approach. Cryptologia. 38, 197-214 (2014)
    [URL] [PDF]
  • Söllner, M., Hoffmann, A., Hoffmann, H., Wacker, A., Leimeister, J.M.: Understanding the Formation of Trust. In: David, K., Geihs, K., Leimeister, J.M., Roßnagel, A., Schmidt, L., Stumme, G., and Wacker, A. (eds.) Socio-technical Design of Ubiquitous Computing Systems. pp. 39-58. Springer, Berlin (2014)
    [URL]
  • Wacker, A., Leimeister, J.M., Hoffmann, H.: The Future of Socio-Technical Design for Ubiquitous Computing Systems. In: David, K., Geihs, K., Leimeister, J.M., Roßnagel, A., Schmidt, L., Stumme, G., and Wacker, A. (eds.) Socio-technical Design of Ubiquitous Computing Systems. pp. 341-353. Springer, Berlin (2014)
    [URL]

2013

  • Hähner, J., Rudolph, S., Tomforde, S., Fisch, D., Sick, B., Kopal, N., Wacker, A.: A Concept for Securing Cyber-Physical Systems with Organic Computing Techniques. 1st International Workshop on „Self-optimisation in organic and autonomic computing systems“ (SAOS13), held in conjunction with 26th International Conference on Architecture of Computing Systems (ARCS 2013), Prague, Czech Republic (2013)
    [URL] [PDF]
  • Voigtmann, C., Schütte, C., Wacker, A., David, K.: A new approach for distributed and collaborative context prediction. 10th IEEE Workshop on Context Modeling and Reasoning, CoMoRea 2013, in conjunction with IEEE Pervasive Computing and Communication, PerCom 2013 San Diego, California, USA (2013)
    [URL] [PDF]
  • Jandt, S., Kieselmann, O., Wacker, A.: Recht auf Vergessen im Internet - Diskrepanz zwischen rechtlicher Zielsetzung und technischer Realisierbarkeit? Datenschutz und Datensicherheit (DuD). 37, 235-241 (2013)
    [URL] [PDF]
  • Kieselmann, O., Kopal, N., Wacker, A.: Interdisziplinäre Sicherheitsanalyse. 10. Berliner Werkstatt Mensch-Maschine-Systeme - Grundlagen und Anwendungen der Mensch-Maschine-Interaktion. Berlin (2013)
    [URL]

2012

  • Hick, S., Esslinger, B., Wacker, A.: Reducing the Complexity of Understanding Cryptology using CrypTool. The 10th International Conference on Education and Information Systems,Technologies and Applications (EISTA 2012). Orlando, Florida, USA (2012)
    [URL] [PDF]
  • Wander, M., Holzapfel, S., Wacker, A., Weis, T.: NTALG - TCP NAT Traversal with Application-Level Gateways(Demonstration). 9th IEEE Consumer Communications and Networking Conference, CCNC 2012. Las Vegas, Nevada, USA (2012)
    [URL] [PDF]
  • Boelmann, C., Weis, T., Engel, M., Wacker, A.: Self-Stabilizing Micro Controller for Large-Scale Sensor Networks in Spite of Program Counter Corruptions due to Soft Errors. 18th IEEE International Conference on Parallel and Distributed Systems (ICPADS 2012). Singapore (2012)
    [URL] [PDF]
  • Shirmohammadi, S., Hu, S.-yun, Ooi, W.T., Schiele, G., Wacker, A.: Mixing Virtual and Physical Participation: The Future of Conference Attendance? Workshop on Massively Multiuser Virtual Environemnts 2012 (MMVE12). Munich, Germany (2012)
    [URL] [PDF]
  • Söllner, M., Hoffmann, A., Hoffmann, H., Wacker, A., Leimeister, J.M.: Understanding the Formation of Trust in IT Artefacts. International Conference on Information Systems (ICIS 2012). Orlando, Florida, USA (2012)
    [URL]
  • Holzapfel, S., Wacker, A., Weis, T., Wander, M.: An Architecture for Complex Peer-to-Peer Systems. Proceedings of the 4th IEEE International Workshop on Digital Entertainment, Networked Virtual Environments, and Creative Technology, DENVECT 2012, held in conjunction with the IEEE Consumer Communications and Networking Conference, CCNC 2012. Las Vegas, Nevada (2012)
    [URL] [PDF]

2011

  • Wander, M., Weis, T., Wacker, A.: Detecting Opportunistic Cheaters in Volunteer Computing. Proceedings of the First International Workshop on Privacy, Security and Trust in Mobile and Wireless Systems, MobiPST 2011, held in conjunction with the 20th International Conference on Computer Communications and Networks, ICCCN 2011. Maui, Hawaii, USA (2011)
    [URL] [PDF]
  • Holzapfel, S., Wander, M., Wacker, A., Lorenz, S., Weis, T.: A New Protocol to Determine the NAT Characteristics of a Host. Proceedings of the 8th International Workshop on Hot Topics in Peer-to-Peer Systems, HotP2P 2011, held in conjunction with the 25th IEEE International Parallel & Distributed Processing Symposium, IPDPS 2011. Anchorage, Alaska, USA (2011)
    [URL] [PDF
  • Holzapfel, S., Wander, M., Wacker, A., Weis, T.: SYNI – TCP Hole Punching Based on SYN Injection. 10th IEEE International Symposium on Network Computing and Applications, IEEE NCA11. Cambridge, Massachusetts, USA (2011)
    [URL] [PDF]
  • Weis, T., Wacker, A.: Self-stabilizing Embedded Systems. Proceedings of the Organic Computing Workshop 2011, OC'11, held in conjunction with the 8th IEEE/ACM International Conference on Autonomic Computing, ICAC 2011. Karlsruhe, Germany (2011)
    [URL] [PDF
  • Weis, T., Wacker, A.: Federating Websites with the Google Wave Protocol. Internet Computing, IEEE.15, 51 - 58 (2011)
    [URL] [PDF]
  • Parzyjegla, H., Schröter, A., Seib, E., Holzapfel, S., Wander, M., Richling, J., Wacker, A., Heiß, H.-U., Mühl, G., Weis, T.: Model-Driven Development of Self-Organizing Control Applications. Chapter 2.1, in Organic Computing - A Paradigm Shift for Complex Systems. Birkäuser Verlag, Basel, Switzerland (2011)
    [URL] [PDF]

2010

  • Wander, M., Wacker, A., Weis, T.: Towards Peer-to-Peer-based Cryptanalysis. Proceedings of the 6th IEEE LCN Workshop on Security in Communication Networks (SICK2010), organized at the 35th IEEE Conference on Local Computer Networks (LCN2010). Denver, Colorado, USA (2010)
    [URL] [PDF]

2009

  • Saternus, M., Weis, T., Holzapfel, S., Wacker, A.: Gears4Net-an Asynchronous Programming Model. Proceedings of the Workshop on Parallel Programming Models and Systems Software for High-End Computing (P2S2), organized at the 38th International Conference on Parallel Processing 2009 (ICPP09). Vienna, Austria (2009)
    [URL] [PDF]
  • Knoll, M., Helling, M., Wacker, A., Holzapfel, S., Weis, T.: Bootstrapping Peer-to-Peer Systems Using IRC. Proceedings of the 5th International Workshop on Collaborative Peer-to-Peer Systems, COPS09, organized at the 18th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, WETICE 2009. Groningen, The Netherlands (2009)
    [URL] [PDF]
  • Weis, T., Wacker, A., Schuster, S., Holzapfel, S.: Towards Logical Clocks in P2P-based MMVEs. Proceedings of the 1st International Workshop on Concepts of Massively Multiuser Virtual Environments, CoMMVE09, organized at the 16th ITG/GI Fachtagung - Kommunikation in Verteilten Sytemen 2009, KiVS 2009. Kassel, Germany (2009)
    [URL] [PDF]
  • Schuster, S., Wacker, A., Weis, T.: Fighting Cheating in P2P-based MMVEs with Disjoint Path Routing. Proceedings of the 1st International Workshop on Concepts of Massively Multiuser Virtual Environments, CoMMVE09, organized at the 16th ITG/GI Fachtagung - Kommunikation in Verteilten Sytemen 2009, KiVS 2009. Kassel, Germany (2009)
    [URL] [PDF]

2008

  • Knoll, M., Wacker, A., Schiele, G., Weis, T.: Bootstrapping in Peer-to-Peer Systems. Proceedings of the 14th International Conference on Parallel and Distributed Systems, ICPADS 2008. Melbourne, Victoria, Australia (2008)
    [URL] [PDF]
  • Gauger, M., Minder, D., Marrón, P.J., Wacker, A., Lachenmann, A.: Prototyping sensor-actuator networks for home automation. Proceedings of the 3rd Workshop on Real-World Wireless Sensor Networks, REALWSN 2008 organized at ACM EuroSys. Glasgow, Scotland (2008)
    [URL] [PDF]
  • Wacker, A., Schiele, G., Schuster, S., Weis, T.: Towards an Authentication Service for Peer-to-Peer based Massively Multiuser Virtual Environments. Int. J. Advanced Media and Communications. (2008).
    [URL] [PDF]
  • Wacker, A.: Key Distribution Schemes for Resource-Constrained Devices in Wireless Sensor Networks. May 2008 (2008)
    [URL] [PDF]
  • Weis, T., Wacker, A.: Self-stabilizing Automata. Proceedings of the Biologically Inspired Cooperative Computing 2008, BICC 2008, organized at the 20th IFIP World Computer Congress, WCC 2008. Milano, Italy (2008)
    [URL] [PDF]
  • Wacker, A., Schiele, G., Holzapfel, S., Weis, T.: A NAT Traversal Mechanism for Peer-To-Peer Networks. Proceedings of the 8th International Conference on Peer-to-Peer Computing, IEEE P2P08. Aachen, Germany (2008)
    [URL] [PDF]
  • Schiele, G., Sueselbeck, R., Wacker, A., Triebel, T., Becker, C.: Consistency Management for Peer-to-Peer-based Massively Multiuser Virtual Environments. Proceedings of the The 1st International Workshop on Massively Multiuser Virtual Environments, MMVE08, organized at the IEEE Virtual Reality 2008, IEEE VR2008. Reno, Nevada, USA (2008)
    [URL] [PDF]

2007

  • Schiele, G., Sueselbeck, R., Wacker, A., Weis, T., Haehner, J., Becker, C.: Requirements of Peer-to-Peer-based Massively Multiplayer Online Gaming. Proceedings of the Seventh International Workshop on Global and Peer-to-Peer Computing, organized at the IEEE/ACM International Symposium on Cluster Computing and the Grid 2007, CCGRID 2007. Brazil, May 2007 (2007)
    [URL] [PDF]
  • Knoll, M., Wacker, A., Schiele, G., Weis, T. Decentralized bootstrapping in pervasive applications. Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications, PerCom 07, Work in Progress Session. White Plains, NY, USA (2007)
    [URL] [PDF]

2005

  • Wacker, A., Knoll, M., Heiber, T., Rothermel, K.: A New Approach for Establishing Pairwise Keys for Securing Wireless Sensor Networks (© 2005 ACM 1-59593-054-X/05/001). 3rd ACM Conference on Embedded Networked Sensor Systems, SenSys 2005. San Diego, California, USA (2005)
    [URL] [PDF]

2004

  • Wacker, A., Heiber, T., Cermann, H., Marrón, P.J.: A fault-tolerant Key-Distribution Scheme for Securing Wireless Ad-Hoc Networks (Springer-Verlag). Second International Conference on Pervasive Computing 2004. Linz/Vienna, Austria (2004)
    [URL] [PDF]
  • Wacker, A., Heiber, T., Cermann, H.: A Key-Distribution Scheme for Wireless Home Automation Networks (IEEE). First IEEE International Consumer Communications and Networking Conference 2004. Las Vegas, USA (2004)
    [URL] [PDF]