Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

apl. Prof. Dr. -Ing. Niels Hansen University of Stuttgart

Replication Data for: Biocatalytic stereocontrolled head-to-tail cyclizations of unbiased terpenes as a tool in chemoenzymatic synthesis, and . Dataset, (2024)Related to: Schneider, Andreas; Lystbæk, Thomas B.; Markthaler, Daniel; Hansen, Niels; Hauer, Bernhard (2024): Biocatalytic stereocontrolled head-to-tail cyclizations of unbiased terpenes as a tool in chemoenzymatic synthesis. In: Nature Communications, 15, 4925. doi: 10.1038/s41467-024-48993-9.
 

Other publications of authors with the same name

Service-Oriented Business Solution Development Driven by Process Model., , , and . CIT, page 1086-1092. IEEE Computer Society, (2005)Anti-phishing based on automated individual white-list., , and . Digital Identity Management, page 51-60. ACM, (2008)Poster: collaborative policy administration., , , , and . ACM Conference on Computer and Communications Security, page 777-780. ACM, (2011)An Event and Service Interacting Model and Event Detection Based on the Broker/Service Model., , , and . CSCWD, page 20-24. IEEE, (2001)Using a Smart Phone to Strengthen Password-Based Authentication., , and . iThings/CPSCom, page 372-379. IEEE Computer Society, (2011)Process-context aware matchmaking for web service composition., , and . J. Network and Computer Applications, 31 (4): 559-576 (2008)Dynamic combination of authentication factors based on quantified risk and benefit., , , , and . Security and Communication Networks, 7 (2): 385-396 (2014)Permission based Android security: Issues and countermeasures., , and . Computers & Security, (2014)Apply Measurable Risk to Strengthen Security of a Role-Based Delegation Supporting Workflow System., , and . POLICY, page 45-52. IEEE Computer Society, (2009)A trusted decentralized access control framework for the client/server architecture., , , and . J. Network and Computer Applications, 33 (2): 76-83 (2010)