![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Penicillinallergie – Wahrheit oder Pflicht?
Die β‑Lactam-Antibiotika gehören zu den sichersten und am besten verträglichen Antibiotika. Viele Patienten berichten allerdings von Allergien gegen Penicillin. Diesen Patienten werden sämtliche β‑Lactam-Antib...
-
Article
Open AccessMixed response of trace element concentrations in fluvial sediments to a flash flood in a former mining area
Floods, especially flash floods, are the major transporting agent for fluvial sediments, whose pollution is a global concern. As floods result in the dispersion of and exposure to these sediments, a profound u...
-
Article
Open AccessMorphodynamics and heavy metal accumulation in an artificially built near-natural river (Inde, Germany)
Heavy metals in riverine sediments threaten fluvial ecosystems worldwide. Sediment cascades transporting the compounds downstream lead to pollution stress downstream from the original input source. In regulate...
-
Article
Open AccessThe risk may not be limited to flooding: polluted flood sediments pose a human health threat to the unaware public
Because of global climate change, extreme flood events are expected to increase in quantity and intensity in the upcoming decades. In catchments affected by ore mining, flooding leads to the deposition of fine...
-
Article
Open AccessEcological effects of selective oral decontamination on multidrug-resistance bacteria acquired in the intensive care unit: a case–control study over 5 years
This case–control study investigated the long-term evolution of multidrug-resistant bacteria (MDRB) over a 5-year period associated with the use of selective oropharyngeal decontamination (SOD) in the intensiv...
-
Article
Open AccessFirst evidence of long-term effects of transcranial pulse stimulation (TPS) on the human brain
With the high spatial resolution and the potential to reach deep brain structures, ultrasound-based brain stimulation techniques offer new opportunities to non-invasively treat neurological and psychiatric dis...
-
Article
Open AccessOptimal loading dose of meropenem before continuous infusion in critically ill patients: a simulation study
The aim of this study was to investigate optimal loading doses prior to continuous infusion of meropenem in critically ill patients. A previously published and successfully evaluated pharmacokinetic model of c...
-
Chapter and Conference Paper
Cache-Side-Channel Quantification and Mitigation for Quantum Cryptography
Quantum cryptography allows one to transmit secret information securely, based on the laws of quantum physics. It consists of (1) the transmission of physical particles like photons and (2) the software-based ...
-
Chapter and Conference Paper
RiCaSi: Rigorous Cache Side Channel Mitigation via Selective Circuit Compilation
Cache side channels constitute a persistent threat to crypto implementations. In particular, block ciphers are prone to attacks when implemented with a simple lookup-table approach. Implementing crypto as sof...
-
Article
Open AccessImproving sensitivity, specificity, and reproducibility of individual brainstem activation
Functional imaging of the brainstem may open new avenues for clinical diagnostics. However, for reliable assessments of brainstem activation, further efforts improving signal quality are needed. Six healthy su...
-
Article
Open AccessElucidating the mechanism of action of domatinostat (4SC-202) in cutaneous T cell lymphoma cells
Targeting epigenetic modifiers is effective in cutaneous T cell lymphoma (CTCL). However, there is a need for further improvement of this therapeutic approach. Here, we compared the mode of action of romidepsi...
-
Chapter and Conference Paper
How Secure Is Green IT? The Case of Software-Based Energy Side Channels
Software-based energy measurement features in contemporary CPUs allow one to track and to limit energy consumption, e.g., for realizing green IT. The security implications of software-based energy measurement,...
-
Chapter and Conference Paper
Bounding the Cache-Side-Channel Leakage of Lattice-Based Signature Schemes Using Program Semantics
In contrast to classical signature schemes, such as RSA or ECDSA signatures, the lattice-based signature scheme ring-TESLA is expected to be resistant even against quantum adversaries. Due to a recent key reco...
-
Chapter and Conference Paper
A Systematic Study of Cache Side Channels Across AES Implementations
While the AES algorithm is regarded as secure, many implementations of AES are prone to cache side-channel attacks. The lookup tables traditionally used in AES implementations for storing precomputed results p...
-
Chapter and Conference Paper
AVR Processors as a Platform for Language-Based Security
AVR processors are widely used in embedded devices. Hence, it is crucial for the security of such devices that cryptography on AVR processors is implemented securely. Timing-side-channel vulnerabilities and ot...