Autor der Publikation

Hybrid security protocol for wireless body area networks.

, , , und . Wireless Communications and Mobile Computing, 11 (2): 277-288 (2011)

Bitte wählen Sie eine Person um die Publikation zuzuordnen

Um zwischen Personen mit demselben Namen zu unterscheiden, wird der akademische Grad und der Titel einer wichtigen Publikation angezeigt. Zudem lassen sich über den Button neben dem Namen einige der Person bereits zugeordnete Publikationen anzeigen.

apl. Prof. Dr. -Ing. Niels Hansen University of Stuttgart

Replication Data for: Biocatalytic stereocontrolled head-to-tail cyclizations of unbiased terpenes as a tool in chemoenzymatic synthesis, und . Dataset, (2024)Related to: Schneider, Andreas; Lystbæk, Thomas B.; Markthaler, Daniel; Hansen, Niels; Hauer, Bernhard (2024): Biocatalytic stereocontrolled head-to-tail cyclizations of unbiased terpenes as a tool in chemoenzymatic synthesis. In: Nature Communications, 15, 4925. doi: 10.1038/s41467-024-48993-9.
Replication Data for: Biocatalytic stereocontrolled head-to-tail cyclizations of unbiased terpenes as a tool in chemoenzymatic synthesis, und . Dataset, (2024)Related to: Schneider, Andreas; Lystbæk, Thomas B.; Markthaler, Daniel; Hansen, Niels; Hauer, Bernhard (2024): Biocatalytic stereocontrolled head-to-tail cyclizations of unbiased terpenes as a tool in chemoenzymatic synthesis. In: Nature Communications, 15, 4925. doi: 10.1038/s41467-024-48993-9.Biocatalytic stereocontrolled head-to-tail cyclizations of unbiased terpenes as a tool in chemoenzymatic synthesis, , , , und . Nature Communications, 15 (1): 4925 (10.06.2024)
 

Weitere Publikationen von Autoren mit dem selben Namen

Hybrid security protocol for wireless body area networks., , , und . Wireless Communications and Mobile Computing, 11 (2): 277-288 (2011)Automated and coupled services of advanced smart surveillance systems toward green IT: tracking, retrieval and digital evidence., , , und . The Journal of Supercomputing, 69 (3): 1215-1234 (2014)A new proposal for a digital evidence container for security convergence., , und . ICCSCE, Seite 171-175. (2011)The Traceback Method about DoS Attack in Open Grid Computing Environment., , , , und . FGCN (1), Seite 391-394. IEEE Computer Society, (2008)The encryption method to share a secret binary image and its decryption system., , und . ISICT, Volume 49 von ACM International Conference Proceeding Series, Seite 94-99. Trinity College Dublin, (2003)Efficient and User Friendly Inter-domain Device Authentication/Access Control for Home Networks., , und . EUC, Volume 4096 von Lecture Notes in Computer Science, Seite 131-140. Springer, (2006)Security Framework for Home Network: Authentication, Authorization, and Security Policy., , , , und . PAKDD Workshops, Volume 4819 von Lecture Notes in Computer Science, Seite 621-628. Springer, (2007)Home Network Device Authentication: Device Authentication Framework and Device Certificate Profile., , , und . APWeb/WAIM Workshops, Volume 4537 von Lecture Notes in Computer Science, Seite 573-582. Springer, (2007)Analyses of Crypto Module for Gbps VPN System., und . J. Inform. and Commun. Convergence Engineering, 1 (4): 213-216 (2003)A Study on Reliable Communication in ATN Environment., und . IKE, Seite 370-373. CSREA Press, (2009)