Georg Neubauer

Learn More
The weakening of the widely used SHA-1 hash function has also cast doubts on the strength of the related algorithms of the SHA-2 family. The US NIST has therefore initiated the SHA-3 competition in order to select a modern hash function algorithm as a " backup " for SHA-2. This algorithm should be efficiently implementable both in software and hardware(More)
When disasters occur, key factors for minimizing damages and loss of lives are access to necessary information and effective communication between emergency services. In cross-border disaster management, further challenges arise: language barriers, uneven know-how, organisational and technical differences in particular concerning communication and data or(More)
The authors present the results of a longitudinal investigation in the utilization of Linked Data technologies along the content value chain. The authors analyzed 71 papers in the period from 2006 to 2014 that used Linked data technologies in editorial workflows. By coding the primary and secondary research topics addressed in the paper the authors draw a(More)
  • 1