<--- Back to Details
First PageDocument Content
Archaeological sub-disciplines / Geological history of Earth / Physical geography / Divergence problem / Dendroclimatology / Climate change / Proxy / Global dimming / Tree line / Paleoclimatology / Dendrology / Historical geology
Date: 2007-04-09 14:03:53
Archaeological sub-disciplines
Geological history of Earth
Physical geography
Divergence problem
Dendroclimatology
Climate change
Proxy
Global dimming
Tree line
Paleoclimatology
Dendrology
Historical geology

Add to Reading List

Source URL: www.ldeo.columbia.edu

Download Document from Source Website

File Size: 737,62 KB

Share Document on Facebook

Similar Documents

Cryptography / Public-key cryptography / Proxy re-encryption / ID-based encryption / Homomorphic encryption / ElGamal encryption / Chosen-ciphertext attack / Encryption / RSA / Key / Symmetric-key algorithm / Identity-based conditional proxy re-encryption

Revisiting Proxy Re-Encryption: Forward Secrecy, Improved Security, and Applications David Derler1 , Stephan Krenn2 , Thomas Lor¨ unser2 , Sebastian Ramacher1 , 2 Daniel Slamanig , and Christoph Striecks2

DocID: 1xVxZ - View Document

Computing / Network performance / Firewall software / System software / Flow control / Explicit Congestion Notification / Information and communications technology / Transmission Control Protocol / Netfilter / Packet loss / Firewall / Communication protocol

Pascal Sprenger Design and Implementation of an ECN Proxy for Performance Improvements in the Internet

DocID: 1xV7U - View Document

Computing / Network architecture / Internet / Internet protocols / Secure communication / Internet Standards / Cryptographic protocols / Network protocols / Transmission Control Protocol / Proxy server / Deep packet inspection / Steganography

StegoTorus: A Camouflage Proxy for the Tor Anonymity System Zachary Weinberg,1,2 Jeffrey Wang,3 Vinod Yegneswaran,2 Linda Briesemeister,2 Steven Cheung,2 Frank Wang,3 and Dan Boneh 3 1

DocID: 1xV7f - View Document

Cryptography / Public-key cryptography / Key management / Public key infrastructure / Proxy re-encryption / Identity-based cryptography / Encryption / Symmetric-key algorithm / Key generation / Integrated Encryption Scheme / Hybrid cryptosystem / Cipher

NuCypher: A proxy re-encryption network to empower privacy in decentralized systems Michael Egorov,∗ David Nuñez,† and MacLane Wilkison‡ NuCypher (Dated: June 19, 2018) NuCypher is a decentralized Key Management S

DocID: 1xUUF - View Document

Public-key cryptography / Cryptography / Homeomorphisms / Homomorphic encryption / Proxy re-encryption / Digital signature / Mathematics

Homomorphic Proxy Re-Authenticators and Applications to Verifiable Multi-User Data Aggregation David Derler, Sebastian Ramacher, and Daniel Slamanig April 2017—FC 2017, Sliema, Malta

DocID: 1xUvk - View Document