Author of the publication

Secure, efficient and revocable multi-authority access control system in cloud storage.

, , , , , and . Computers & Security, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

Dr. -Ing. Daniel Markthaler University of Stuttgart

Replication Data for: Biocatalytic stereocontrolled head-to-tail cyclizations of unbiased terpenes as a tool in chemoenzymatic synthesis, and . Dataset, (2024)Related to: Schneider, Andreas; Lystbæk, Thomas B.; Markthaler, Daniel; Hansen, Niels; Hauer, Bernhard (2024): Biocatalytic stereocontrolled head-to-tail cyclizations of unbiased terpenes as a tool in chemoenzymatic synthesis. In: Nature Communications, 15, 4925. doi: 10.1038/s41467-024-48993-9.
 

Other publications of authors with the same name

A security enhanced authentication and key distribution protocol for wireless networks., , , , and . Security and Communication Networks, 5 (4): 343-352 (2012)TSFR: Time-aware Semantic-based Friend Recommendation in LBSNs., , , , and . APSIPA, page 266-271. IEEE, (2018)Log-based Anomalies Detection of MANETs Routing with Reasoning and Verification., , , , and . APSIPA, page 240-246. IEEE, (2018)Wireless Mesh Networks-Based Multinetwork Convergence and Security Access., and . Guide to Wireless Mesh Networks, Springer, (2009)Attribute Based Multisignature Scheme for Wireless Communications., , , , and . Mobile Information Systems, (2015)Selecting Critical Data Flows in Android Applications for Abnormal Behavior Detection., , and . Mobile Information Systems, (2017)Fast Parallel Computation of Tate Pairing., , , , and . INCoS, page 178-183. IEEE Computer Society, (2011)Data Owner Based Attribute Based Encryption., , and . INCoS, page 144-148. IEEE, (2015)A Provably Secure Three-Party Password Authenticated Key Exchange Protocol without Using Server's Public-Keys and Symmetric Cryptosystems., , , , and . ITC, 44 (2): 195-206 (2015)An novel three-party authenticated key exchange protocol using one-time key., , , , and . J. Network and Computer Applications, 36 (1): 498-503 (2013)