Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Authentic storage

Private and authentic storage. So far, it was assumed that data stored in correct entities is completely private, i.e., an attacker can neither read nor modify it. However, it is sometimes useful to distinguish how much of the data really has to be secret, because private storage is hard to implement in practice — one needs... [Pg.111]

Values skjtemp are abbreviated as sk. The figure shows the situation after three real messages have been signed. Only the encircled values have to be in private storage. Values crossed out have been deleted. The remaining values are in authentic storage, where authi is the information stored in authentic storage instead of ski, i.e., (mi, si, in Construction 10.19. [Pg.333]

Before the construction can be presented, or at least before it can be proved, one needs an additional definition for the distinction between private and authentic storage. For brevity, it is only made for schemes with one risk bearer and with prekey. [Pg.333]

The corresponding standard fail-stop signature scheme with top-down tree authentication and a small amount of private storage (with prekey and with a distinction between private and authentic storage) is constructed by using the given one-time scheme in top-down tree authentication (Construction 10.13) with the following modifications ... [Pg.335]

First of all, in the general part, the supply of herbal drugs and herbal mixtures, the indications and possible treatments, are dealt with, as well as explaining herbal preparations, how to make the lea, storage, and authentication. Short sections are devoted to the Standard Licences and the contamination of drugs (microbiological, heavy metal, fumigation, radioactive substances). [Pg.11]

A new major aggregation pheromone emitted by the storage mite, Chor-toglyphus arcuatus, was identified as AR, 6R, 8i )-4,6,8-trimethyldecan-2-one. To identify this new pheromone from mites, headspace of undisturbed colonies of storage mites was analyzed by GC-MS by the use of a closed-loop stripping apparatus or solid phase microextraction. The structure was then elucidated by MS, synthesis of authentic samples, and GC on a chiral... [Pg.308]

For fruits and their products, HPLC techniques for phenolics have been used to study the effect of processing, concentration, and storage on the phenolic composition of juices as well as a potential precursor for an off-flavor compound in juices. Phenolic analysis has been further applied to the detection of economic adulteration and especially to verify the authenticity of fruit juices. This is especially important when cheaper fruits can be added to more expensive ones in a fraudulent manner. In most fruits, the nonanthocyanin flavonoids consist mainly of flavonols and flavanols, with trace amounts of flavones. Glycosides are the predominant forms present. These most often are separated by reversed-phase HPLC on Cl8 columns with gradients consisting of acidified H20 and ACN, MeOH, or EtOH. [Pg.789]

N—O-sulfation of minoxidil in the presence of adenosine-3 -phospho-5 -phosphosulfate (PAPS) (equation 24). The enzyme-synthetized product was identical to authentic N—O-sulfate with respect to chromatographic behavior and mass spectral characteristics and was split to minoxidil when treated with sulfatase183. The pH optimum for minoxidil N—O-sulfation was about 8.0. Enzyme activity in crude preparations was maintained for several months during storage at —76°C, while activity of partially purified enzyme was lost under these conditions183. [Pg.1655]

Communication between an agent container and the Platform Manager is authenticated due to the fact that only the owner of the container, whose identity was verified and who received the shared key upon service purchase, can create encrypted request to Platform Manager. And Platform Manager looks up the shared key in its data storage where the key is associated to container s unique identifier... [Pg.339]

Written sampling plans Representative samples Authenticity of batch information provided Storage, labeling, transferring, and tracking of samples Testing... [Pg.219]

A standard (or sample) may also include some additives that have been added to stabilise the solution. This should also be detailed on the label. Additives should not significantly affect the authenticity of the standard. A typical example is where a small amount of nitric acid is added to a solution of an analytical standard to keep metal ions in solution during storage. [Pg.48]

The stability in the sample matrix should be established under storage conditions, i.e. in the same vessels, at the same temperature and over a period at least as long as the one expected for authentic samples [1, 2, 4, 5, 9, 10, 12]. [Pg.6]

Chirality evaluation of linalyl acetate and linalool have been introduced as new and substantial criteria in the authenticity control of lavender oils. In particular, linalyl acetate from genuine lavender oils has high enantiomeric purity favouring the R-configuration, irrespective of the Lavandula species, and storage or work-up conditions [32]. Using 2,3-di-0-acylated-6-0-silylated cyclodextrins as a new generation of chiral stationary phases in enantio-cGC, most of chiral compounds of Lavandula oil, are stereoanalyzed simultaneously (Fig. 6.37 Fig. 6.38). [Pg.680]

An example of this distinction in fail-stop signature schemes is given in Section 10.4. The related distinction between authentic and untrusted storage was made for incremental signature schemes [BeGG95]. One can also regard server-aided computation as related if the server is a larger untrusted device of the same user. [Pg.112]

MerkSS, G0MR88]. The former leads to shorter signatures, the latter is more flexible. Its basic idea is that new public keys are authenticated using old keys. Fail-stop versions of both are presented in Sections 10.2 and 10.3, respectively. Section 10.4 contains a variant of top-down tree authentication that only needs a small amount of private storage. This may be important in practice, see the end of Section 5.4.1. [Pg.144]

Top-Down Tree Authentication with Small Amount of Private Storage... [Pg.332]

However, it is now shown that a secret key of this size never needs to exist completely at the same time In the following construction, the signer s entity only needs a small amount of private storage, whereas the rest of its information can be stored in authentic, but not necessarily secret storage. As mentioned in Section 5.4.1, Some Special Properties , this can be an advantage in practice. [Pg.332]

A large amount of private storage is needed in Construction 10.13 because all the values skjempi must be stored secretly so that one-time forgeries at any node of the tree can be proved. The basic idea that will be used to reduce private storage in this construction is to store those sk tempi s that are no longer used for signing in encrypted form (in an authentic way, but not secretly) and to store only the encryption key secretly. The idea is shown in Figure 10.3. [Pg.332]


See other pages where Authentic storage is mentioned: [Pg.334]    [Pg.334]    [Pg.334]    [Pg.334]    [Pg.334]    [Pg.338]    [Pg.334]    [Pg.334]    [Pg.334]    [Pg.334]    [Pg.334]    [Pg.338]    [Pg.105]    [Pg.246]    [Pg.20]    [Pg.134]    [Pg.257]    [Pg.113]    [Pg.402]    [Pg.379]    [Pg.1296]    [Pg.788]    [Pg.961]    [Pg.202]    [Pg.206]    [Pg.271]    [Pg.77]    [Pg.116]    [Pg.2553]    [Pg.798]    [Pg.557]    [Pg.227]    [Pg.261]    [Pg.67]    [Pg.2]    [Pg.112]    [Pg.325]    [Pg.332]   
See also in sourсe #XX -- [ Pg.111 , Pg.334 ]




SEARCH



Authenticity

© 2024 chempedia.info