Georg Neubauer

Learn More
The weakening of the widely used SHA-1 hash function has also cast doubts on the strength of the related algorithms of the SHA-2 family. The US NIST has therefore initiated the SHA-3 competition in order to select a modern hash function algorithm as a " backup " for SHA-2. This algorithm should be efficiently implementable both in software and hardware(More)
BACKGROUND The development of new wireless communication technologies that emit radio frequency electromagnetic fields (RF-EMF) is ongoing, but little is known about the RF-EMF exposure distribution in the general population. Previous attempts to measure personal exposure to RF-EMF have used different measurement protocols and analysis methods making(More)
According to manufacturers of both magnetic resonance imaging (MRI) machines, and implantable neurological pulse generators (IPGs), MRI is contraindicated for patients with IPGs. A major argument for this restriction is the risk to induce heat in the leads due to the electromagnetic field, which could be dangerous for the surrounding brain parenchyma. The(More)
The authors present the results of a longitudinal investigation in the utilization of Linked Data technologies along the content value chain. The authors analyzed 71 papers in the period from 2006 to 2014 that used Linked data technologies in editorial workflows. By coding the primary and secondary research topics addressed in the paper the authors draw a(More)
When disasters occur, key factors for minimizing damages and loss of lives are access to necessary information and effective communication between emergency services. In cross-border disaster management, further challenges arise: language barriers, uneven know-how, organisational and technical differences in particular concerning communication and data or(More)
  • 1