<--- Back to Details
First PageDocument Content
Lake Vostok / Vostok Station / Paleoclimatology / Antarctica / Ice core / Lake / Ice shelf / Proxy / Ice age / Physical geography / Subglacial lakes / Extreme points of Earth
Date: 2009-06-16 13:26:15
Lake Vostok
Vostok Station
Paleoclimatology
Antarctica
Ice core
Lake
Ice shelf
Proxy
Ice age
Physical geography
Subglacial lakes
Extreme points of Earth

Add to Reading List

Source URL: www.polarcom.gc.ca

Download Document from Source Website

File Size: 472,96 KB

Share Document on Facebook

Similar Documents

Cryptography / Public-key cryptography / Proxy re-encryption / ID-based encryption / Homomorphic encryption / ElGamal encryption / Chosen-ciphertext attack / Encryption / RSA / Key / Symmetric-key algorithm / Identity-based conditional proxy re-encryption

Revisiting Proxy Re-Encryption: Forward Secrecy, Improved Security, and Applications David Derler1 , Stephan Krenn2 , Thomas Lor¨ unser2 , Sebastian Ramacher1 , 2 Daniel Slamanig , and Christoph Striecks2

DocID: 1xVxZ - View Document

Computing / Network performance / Firewall software / System software / Flow control / Explicit Congestion Notification / Information and communications technology / Transmission Control Protocol / Netfilter / Packet loss / Firewall / Communication protocol

Pascal Sprenger Design and Implementation of an ECN Proxy for Performance Improvements in the Internet

DocID: 1xV7U - View Document

Computing / Network architecture / Internet / Internet protocols / Secure communication / Internet Standards / Cryptographic protocols / Network protocols / Transmission Control Protocol / Proxy server / Deep packet inspection / Steganography

StegoTorus: A Camouflage Proxy for the Tor Anonymity System Zachary Weinberg,1,2 Jeffrey Wang,3 Vinod Yegneswaran,2 Linda Briesemeister,2 Steven Cheung,2 Frank Wang,3 and Dan Boneh 3 1

DocID: 1xV7f - View Document

Cryptography / Public-key cryptography / Key management / Public key infrastructure / Proxy re-encryption / Identity-based cryptography / Encryption / Symmetric-key algorithm / Key generation / Integrated Encryption Scheme / Hybrid cryptosystem / Cipher

NuCypher: A proxy re-encryption network to empower privacy in decentralized systems Michael Egorov,∗ David Nuñez,† and MacLane Wilkison‡ NuCypher (Dated: June 19, 2018) NuCypher is a decentralized Key Management S

DocID: 1xUUF - View Document

Public-key cryptography / Cryptography / Homeomorphisms / Homomorphic encryption / Proxy re-encryption / Digital signature / Mathematics

Homomorphic Proxy Re-Authenticators and Applications to Verifiable Multi-User Data Aggregation David Derler, Sebastian Ramacher, and Daniel Slamanig April 2017—FC 2017, Sliema, Malta

DocID: 1xUvk - View Document