Zobrazeno 1 - 10
of 15
pro vyhledávání: '"Benoît Viguier"'
Autor:
Fernanda Gallegos-Poch, Benoît Viguier, Giovanni Menanno, Valentina Mandakovic, Gonzalo Yáñez, Sergio Gutiérrez, Catalina Lizarde, Jaime Vargas Araya, Camila López-Contreras, Pablo Mendez-Quiros, Antonio Maldonado, Mauricio Uribe
Publikováno v:
Surveys in Geophysics. 44:495-525
Autor:
Gloria Arancibia, Véronique Léonardi, Benoît Viguier, Gert Heuser, Matías Taucare, Linda Daniele
Publikováno v:
Hydrogeology Journal. 28:2429-2438
The misunderstanding of hydrogeological processes together with the oversimplification of aquifer conceptual models result in numerous inaccuracies in the management of groundwater resources. In Central Chile (32–36°S), hydrogeological studies hav
Publikováno v:
Hydrological Sciences Journal. 65:1606-1613
Using a statistical approach, Scheihing attempts to demonstrate the direct influence of recharge events in the Precordillera and the Andean Piedmont on water table variations in downstream alluvial...
Autor:
Matías Taucare, Tomás Roquer, Gert Heuser, Nicolás Pérez-Estay, Gloria Arancibia, Gonzalo Yáñez, Benoît Viguier, Ronny Figueroa, Diego Morata, Linda Daniele
Publikováno v:
Journal of South American Earth Sciences. 118:103914
Autor:
Linda Daniele, Christelle Batiot-Guilhe, Benoît Viguier, Véronique de Montety, Guillaume Favreau, Véronique Léonardi, Hervé Jourde
Publikováno v:
Journal of Arid Environments. 168:9-16
In the hyperarid Atacama Desert (Northern Chile), the economic and social development is supported using fossil groundwater. The groundwater extraction (GWE) has significantly increased over the last 30 years, reaching ∼4.2 m3.s−1 in 2018 (+1890%
Publikováno v:
CSF 2021: 34th IEEE Computer Security Foundations Symposium, June 21-25. 2021-Virtual Conference, pp. 529-544
CSF 2021: 34th IEEE Computer Security Foundations Symposium, June 21-25. 2021-Virtual Conference, 529-544. Los Alamitos : IEEE
STARTPAGE=529;ENDPAGE=544;TITLE=CSF 2021: 34th IEEE Computer Security Foundations Symposium, June 21-25. 2021-Virtual Conference
CSF
CSF 2021: 34th IEEE Computer Security Foundations Symposium, June 21-25. 2021-Virtual Conference, 529-544. Los Alamitos : IEEE
STARTPAGE=529;ENDPAGE=544;TITLE=CSF 2021: 34th IEEE Computer Security Foundations Symposium, June 21-25. 2021-Virtual Conference
CSF
We formally prove that the C implementation of the X25519 key-exchange protocol in the TweetNaCl library is correct. We prove both that it correctly implements the protocol from Bernstein’s 2006 paper, as standardized in RFC 7748, as well as the ab
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::7af02581d86f214e1dae9a3667abd782
https://repository.ubn.ru.nl/handle/2066/236529
https://repository.ubn.ru.nl/handle/2066/236529
Deciphering groundwater flow-paths in fault-controlled semiarid mountain front zones (Central Chile)
Autor:
R. Figueroa, Matías Taucare, Linda Daniele, Gloria Arancibia, Gonzalo Yáñez, J. Sanhueza, Benoît Viguier
Publikováno v:
The Science of the total environment. 771
The Mountain-Block Recharge (MBR), also referred to as the hidden recharge, consists of groundwater inflows from the mountain block into adjacent alluvial aquifers. This is a significant recharge process in arid environments, but frequently discarded
Autor:
Mauricio Muñoz, J. Sepúlveda, Diego Morata, Diego Aravena, Eduardo Molina, Antonio Delgado, Benoît Viguier, Matías Taucare, Linda Daniele, Gloria Arancibia, Tomás Roquer
Publikováno v:
Digital.CSIC. Repositorio Institucional del CSIC
instname
instname
Southern Volcanic Zone (SVZ) hosts numerous thermal springs (25–85 °C), related to Liquiñe-Ofqui Fault System (LOFS) and Andean Transverse Faults (ATFs), suggesting the feasibility of low- to high-enthalpy geothermal exploitation. However, the lo
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f84bc820c82d8e4776fc5a9816f312d6
http://hdl.handle.net/10261/224206
http://hdl.handle.net/10261/224206
Publikováno v:
Cryptology and Network Security ISBN: 9783030654108
CANS
Cryptology and Network Security-19th International Conference, CANS 2020, Vienna, Austria, December 14–16, 2020, Proceedings
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Cryptology and Network Security
CANS
Cryptology and Network Security-19th International Conference, CANS 2020, Vienna, Austria, December 14–16, 2020, Proceedings
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Cryptology and Network Security
A major challenge when applying cryptography on constrained environments is the trade-off between performance and security. In this work, we analyzed different strategies for the optimization of several candidates of NIST’s lightweight cryptography
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::4d63d9f749274157da7534d015bca89d
https://doi.org/10.1007/978-3-030-65411-5_26
https://doi.org/10.1007/978-3-030-65411-5_26
Autor:
Benoît Viguier, Matías Taucare, Linda Daniele, Mauricio Muñoz, Eduardo Molina, Gloria Arancibia, Diego Aravena, J. Sepúlveda, Jorge G. F. Crempien, Diego Morata, Tomás Roquer, Antonio Delgado-Huertas
Geothermal activity in the Chilean Southern Volcanic Zone is strongly controlled by the regional Liquine-Ofqui Fault System (LOFS) and the Andean Transverse Faults (ATF). We analyzed fifteen...
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::a3411234fbb75ff4d9d8e0702c67c756
https://doi.org/10.1002/essoar.10501117.2
https://doi.org/10.1002/essoar.10501117.2