Skip to main content

and
  1. No Access

    Article

    Penicillinallergie – Wahrheit oder Pflicht?

    Die β‑Lactam-Antibiotika gehören zu den sichersten und am besten verträglichen Antibiotika. Viele Patienten berichten allerdings von Allergien gegen Penicillin. Diesen Patienten werden sämtliche β‑Lactam-Antib...

    PD Dr. med. Michael Zoller DESAIC, Alexandra Weber in Die Anaesthesiologie (2024)

  2. Article

    Open Access

    Mixed response of trace element concentrations in fluvial sediments to a flash flood in a former mining area

    Floods, especially flash floods, are the major transporting agent for fluvial sediments, whose pollution is a global concern. As floods result in the dispersion of and exposure to these sediments, a profound u...

    Alexandra Weber, Frank Lehmkuhl in Environmental Sciences Europe (2024)

  3. Article

    Open Access

    Morphodynamics and heavy metal accumulation in an artificially built near-natural river (Inde, Germany)

    Heavy metals in riverine sediments threaten fluvial ecosystems worldwide. Sediment cascades transporting the compounds downstream lead to pollution stress downstream from the original input source. In regulate...

    Philipp Schulte, Alexandra Weber, Johannes Keßels in Journal of Sedimentary Environments (2024)

  4. Article

    Open Access

    The risk may not be limited to flooding: polluted flood sediments pose a human health threat to the unaware public

    Because of global climate change, extreme flood events are expected to increase in quantity and intensity in the upcoming decades. In catchments affected by ore mining, flooding leads to the deposition of fine...

    Alexandra Weber, Stefanie Wolf, Nadine Becker in Environmental Sciences Europe (2023)

  5. Article

    Open Access

    Ecological effects of selective oral decontamination on multidrug-resistance bacteria acquired in the intensive care unit: a case–control study over 5 years

    This case–control study investigated the long-term evolution of multidrug-resistant bacteria (MDRB) over a 5-year period associated with the use of selective oropharyngeal decontamination (SOD) in the intensiv...

    Boacheng Wang, Josef Briegel, Wolfgang A. Krueger, Rika Draenert in Intensive Care Medicine (2022)

  6. Article

    Open Access

    First evidence of long-term effects of transcranial pulse stimulation (TPS) on the human brain

    With the high spatial resolution and the potential to reach deep brain structures, ultrasound-based brain stimulation techniques offer new opportunities to non-invasively treat neurological and psychiatric dis...

    Eva Matt, Lisa Kaindl, Saskia Tenk, Anicca Egger in Journal of Translational Medicine (2022)

  7. Article

    Open Access

    Optimal loading dose of meropenem before continuous infusion in critically ill patients: a simulation study

    The aim of this study was to investigate optimal loading doses prior to continuous infusion of meropenem in critically ill patients. A previously published and successfully evaluated pharmacokinetic model of c...

    Uwe Liebchen, Hanna Salletmeier, Simon Kallee, Christina Scharf in Scientific Reports (2021)

  8. No Access

    Chapter and Conference Paper

    Cache-Side-Channel Quantification and Mitigation for Quantum Cryptography

    Quantum cryptography allows one to transmit secret information securely, based on the laws of quantum physics. It consists of (1) the transmission of physical particles like photons and (2) the software-based ...

    Alexandra Weber, Oleg Nikiforov, Alexander Sauer in Computer Security – ESORICS 2021 (2021)

  9. No Access

    Chapter and Conference Paper

    RiCaSi: Rigorous Cache Side Channel Mitigation via Selective Circuit Compilation

    Cache side channels constitute a persistent threat to crypto implementations. In particular, block ciphers are prone to attacks when implemented with a simple lookup-table approach. Implementing crypto as sof...

    Heiko Mantel, Lukas Scheidel, Thomas Schneider in Cryptology and Network Security (2020)

  10. Article

    Open Access

    Improving sensitivity, specificity, and reproducibility of individual brainstem activation

    Functional imaging of the brainstem may open new avenues for clinical diagnostics. However, for reliable assessments of brainstem activation, further efforts improving signal quality are needed. Six healthy su...

    Eva Matt, Florian Ph. S. Fischmeister, Ahmad Amini in Brain Structure and Function (2019)

  11. Article

    Open Access

    Elucidating the mechanism of action of domatinostat (4SC-202) in cutaneous T cell lymphoma cells

    Targeting epigenetic modifiers is effective in cutaneous T cell lymphoma (CTCL). However, there is a need for further improvement of this therapeutic approach. Here, we compared the mode of action of romidepsi...

    Marion Wobser, Alexandra Weber, Amelie Glunz in Journal of Hematology & Oncology (2019)

  12. Chapter and Conference Paper

    How Secure Is Green IT? The Case of Software-Based Energy Side Channels

    Software-based energy measurement features in contemporary CPUs allow one to track and to limit energy consumption, e.g., for realizing green IT. The security implications of software-based energy measurement,...

    Heiko Mantel, Johannes Schickel, Alexandra Weber, Friedrich Weber in Computer Security (2018)

  13. No Access

    Chapter and Conference Paper

    Bounding the Cache-Side-Channel Leakage of Lattice-Based Signature Schemes Using Program Semantics

    In contrast to classical signature schemes, such as RSA or ECDSA signatures, the lattice-based signature scheme ring-TESLA is expected to be resistant even against quantum adversaries. Due to a recent key reco...

    Nina Bindel, Johannes Buchmann, Juliane Krämer in Foundations and Practice of Security (2018)

  14. No Access

    Chapter and Conference Paper

    A Systematic Study of Cache Side Channels Across AES Implementations

    While the AES algorithm is regarded as secure, many implementations of AES are prone to cache side-channel attacks. The lookup tables traditionally used in AES implementations for storing precomputed results p...

    Heiko Mantel, Alexandra Weber, Boris Köpf in Engineering Secure Software and Systems (2017)

  15. Chapter and Conference Paper

    AVR Processors as a Platform for Language-Based Security

    AVR processors are widely used in embedded devices. Hence, it is crucial for the security of such devices that cryptography on AVR processors is implemented securely. Timing-side-channel vulnerabilities and ot...

    Florian Dewald, Heiko Mantel, Alexandra Weber in Computer Security – ESORICS 2017 (2017)