Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

Dr. -Ing. Daniel Markthaler University of Stuttgart

Replication Data for: Biocatalytic stereocontrolled head-to-tail cyclizations of unbiased terpenes as a tool in chemoenzymatic synthesis, and . Dataset, (2024)Related to: Schneider, Andreas; Lystbæk, Thomas B.; Markthaler, Daniel; Hansen, Niels; Hauer, Bernhard (2024): Biocatalytic stereocontrolled head-to-tail cyclizations of unbiased terpenes as a tool in chemoenzymatic synthesis. In: Nature Communications, 15, 4925. doi: 10.1038/s41467-024-48993-9.
 

Other publications of authors with the same name

Electronic Health Records: An Enhanced Security Paradigm to Preserve Patient's Privacy., and . BIOSTEC (Selected Papers), volume 52 of Communications in Computer and Information Science, page 369-380. (2009)Anonymous Authentication from Public-Key Encryption Revisited - (Extended Abstract).. Communications and Multimedia Security, volume 7025 of Lecture Notes in Computer Science, page 247-249. Springer, (2011)Adding Controllable Linkability to Pairing-Based Group Signatures for Free., , and . ISC, volume 8783 of Lecture Notes in Computer Science, page 388-400. Springer, (2014)Revisiting Proxy Re-encryption: Forward Secrecy, Improved Security, and Applications., , , , , and . Public Key Cryptography (1), volume 10769 of Lecture Notes in Computer Science, page 219-250. Springer, (2018)Warrant-Hiding Delegation-by-Certificate Proxy Signature Schemes., and . INDOCRYPT, volume 8250 of Lecture Notes in Computer Science, page 60-77. Springer, (2013)Privacy-enhancing methods for e-health applications: how to prevent statistical analyses and attacks., and . IJBIDM, 3 (3): 236-254 (2008)Fully-Anonymous Short Dynamic Group Signatures Without Encryption., and . IACR Cryptology ePrint Archive, (2016)Key-Homomorphic Signatures and Applications to Multiparty Signatures., and . IACR Cryptology ePrint Archive, (2016)Fully Invisible Protean Signatures Schemes., , , and . IACR Cryptology ePrint Archive, (2019)Efficient Schemes for Anonymous Yet Authorized and Bounded Use of Cloud Resources.. Selected Areas in Cryptography, volume 7118 of Lecture Notes in Computer Science, page 73-91. Springer, (2011)