<--- Back to Details
First PageDocument Content
Dendrology / Paleoclimatology / Archaeology / Geology / Dendrochronology / Proxy / Temperature record / Climate change / Podocarpus / Climate history / Historical geology / Archaeological sub-disciplines
Date: 2014-10-14 07:47:16
Dendrology
Paleoclimatology
Archaeology
Geology
Dendrochronology
Proxy
Temperature record
Climate change
Podocarpus
Climate history
Historical geology
Archaeological sub-disciplines

Add to Reading List

Source URL: www.pages-igbp.org

Download Document from Source Website

File Size: 2,49 MB

Share Document on Facebook

Similar Documents

Cryptography / Public-key cryptography / Proxy re-encryption / ID-based encryption / Homomorphic encryption / ElGamal encryption / Chosen-ciphertext attack / Encryption / RSA / Key / Symmetric-key algorithm / Identity-based conditional proxy re-encryption

Revisiting Proxy Re-Encryption: Forward Secrecy, Improved Security, and Applications David Derler1 , Stephan Krenn2 , Thomas Lor¨ unser2 , Sebastian Ramacher1 , 2 Daniel Slamanig , and Christoph Striecks2

DocID: 1xVxZ - View Document

Computing / Network performance / Firewall software / System software / Flow control / Explicit Congestion Notification / Information and communications technology / Transmission Control Protocol / Netfilter / Packet loss / Firewall / Communication protocol

Pascal Sprenger Design and Implementation of an ECN Proxy for Performance Improvements in the Internet

DocID: 1xV7U - View Document

Computing / Network architecture / Internet / Internet protocols / Secure communication / Internet Standards / Cryptographic protocols / Network protocols / Transmission Control Protocol / Proxy server / Deep packet inspection / Steganography

StegoTorus: A Camouflage Proxy for the Tor Anonymity System Zachary Weinberg,1,2 Jeffrey Wang,3 Vinod Yegneswaran,2 Linda Briesemeister,2 Steven Cheung,2 Frank Wang,3 and Dan Boneh 3 1

DocID: 1xV7f - View Document

Cryptography / Public-key cryptography / Key management / Public key infrastructure / Proxy re-encryption / Identity-based cryptography / Encryption / Symmetric-key algorithm / Key generation / Integrated Encryption Scheme / Hybrid cryptosystem / Cipher

NuCypher: A proxy re-encryption network to empower privacy in decentralized systems Michael Egorov,∗ David Nuñez,† and MacLane Wilkison‡ NuCypher (Dated: June 19, 2018) NuCypher is a decentralized Key Management S

DocID: 1xUUF - View Document

Public-key cryptography / Cryptography / Homeomorphisms / Homomorphic encryption / Proxy re-encryption / Digital signature / Mathematics

Homomorphic Proxy Re-Authenticators and Applications to Verifiable Multi-User Data Aggregation David Derler, Sebastian Ramacher, and Daniel Slamanig April 2017—FC 2017, Sliema, Malta

DocID: 1xUvk - View Document