Author of the publication

Caveat Coercitor: Coercion-Evidence in Electronic Voting.

, , , and . IEEE Symposium on Security and Privacy, page 367-381. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

Dr. -Ing. Daniel Markthaler University of Stuttgart

Replication Data for: Biocatalytic stereocontrolled head-to-tail cyclizations of unbiased terpenes as a tool in chemoenzymatic synthesis, and . Dataset, (2024)Related to: Schneider, Andreas; Lystbæk, Thomas B.; Markthaler, Daniel; Hansen, Niels; Hauer, Bernhard (2024): Biocatalytic stereocontrolled head-to-tail cyclizations of unbiased terpenes as a tool in chemoenzymatic synthesis. In: Nature Communications, 15, 4925. doi: 10.1038/s41467-024-48993-9.
 

Other publications of authors with the same name

Feature Integration as Substitution., , and . FIW, page 275-294. IOS Press, (2003)Automatic Analysis of Security Properties of the TPM.. INTRUST, volume 7711 of Lecture Notes in Computer Science, page 1-4. Springer, (2012)Making Decryption Accountable.. Security Protocols Workshop, volume 10476 of Lecture Notes in Computer Science, page 93-98. Springer, (2017)Cloud computing privacy concerns on our doorstep.. Commun. ACM, 54 (1): 36-38 (2011)StatVerif: Verification of stateful processes., , , and . Journal of Computer Security, 22 (5): 743-821 (2014)Du-Vote: Remote Electronic Voting with Untrusted Computers., , , and . CSF, page 155-169. IEEE Computer Society, (2015)Malware Tolerant (Mesh-)Networks., and . CANS, volume 11124 of Lecture Notes in Computer Science, page 133-153. Springer, (2018)A Formal Analysis of Authentication in the TPM., , , and . Formal Aspects in Security and Trust, volume 6561 of Lecture Notes in Computer Science, page 111-125. Springer, (2010)07421 Executive Summary -- Formal Protocol Verification Applied., , and . Formal Protocol Verification Applied, volume 07421 of Dagstuhl Seminar Proceedings, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany, (2007)Verification of Integrity and Secrecy Properties of a Biometric Authentication Protocol., and . ISPEC, volume 4991 of Lecture Notes in Computer Science, page 1-13. Springer, (2008)