Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

Dr. -Ing. Daniel Markthaler University of Stuttgart

Replication Data for: Biocatalytic stereocontrolled head-to-tail cyclizations of unbiased terpenes as a tool in chemoenzymatic synthesis, and . Dataset, (2024)Related to: Schneider, Andreas; Lystbæk, Thomas B.; Markthaler, Daniel; Hansen, Niels; Hauer, Bernhard (2024): Biocatalytic stereocontrolled head-to-tail cyclizations of unbiased terpenes as a tool in chemoenzymatic synthesis. In: Nature Communications, 15, 4925. doi: 10.1038/s41467-024-48993-9.

Daniel Klötzl University of Stuttgart

NMF-Based Analysis of Mobile Eye-Tracking Data, , , , , , and . Proceedings of the 2024 Symposium on Eye Tracking Research and Applications, page 1–9. New York, NY, USA, Association for Computing Machinery, (Jun 4, 2024)
NMF-Based Analysis of Mobile Eye-Tracking Data, , , , , , and . Proceedings of the 2024 Symposium on Eye Tracking Research and Applications, page 1–9. New York, NY, USA, Association for Computing Machinery, (Jun 4, 2024)Constrained Dynamic Mode Decomposition, , , and . IEEE Transactions on Visualization and Computer Graphics, (2022)
 

Other publications of authors with the same name

PIR-PSI: Scaling Private Contact Discovery., , , and . IACR Cryptology ePrint Archive, (2018)ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation., , and . NDSS, The Internet Society, (2015)RAID-PIR: Practical Multi-Server PIR., , and . CCSW, page 45-56. ACM, (2014)Towards Securing Internet eXchange Points Against Curious onlooKers., , , , and . ANRW, page 32-34. ACM, (2016)SIXPACK: Securing Internet eXchange Points Against Curious onlooKers., , , , and . CoNEXT, page 120-133. ACM, (2017)Privacy-Preserving Interdomain Routing at Internet Scale., , , , , , and . IACR Cryptology ePrint Archive, (2017)Towards Practical Privacy-Preserving Protocols.. Darmstadt University of Technology, Germany, (2019)Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens., , and . IACR Cryptology ePrint Archive, (2014)HyCC: Compilation of Hybrid Protocols for Practical Secure Computation., , , , and . ACM Conference on Computer and Communications Security, page 847-861. ACM, (2018)OnionPIR: Effective Protection of Sensitive Metadata in Online Communication Networks., , and . ACNS, volume 10355 of Lecture Notes in Computer Science, page 599-619. Springer, (2017)