Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Test key

Classification by objective Exploration Exploration OOOO well Appraisal well OO Delineation well Q New-structure test Q New-pool test Q Deeper-pool test Q Shallower-pool test Q New-licence block QQ appraisal test Fault block O extension test Appraisal/outpost 0 test (delineation) Stratigraphic test O0 New-field wildcat 0 New-pool wildcat 0 Deeper-pool test 0 Shallower-pool test 0 Outpost or 00 extension test Key well 00 - Group one - Group two Parametric well O0 Core well 00 Prospecting well 00 Exploratory well 00 Exploration O000 well Appraisal well 0O... [Pg.30]

MSLT multiple sleep latency test KEY REFERENCES AND READINGS... [Pg.631]

To ascertain the effects of non-hERG-mediated QT prolongation, test key compounds in relevant ex vivo (e.g. Langendorff [38], dog purkinje fibers [39]) or in vivo [40] models as early as possible. [Pg.450]

Dynamic models operationally define and quantify the flows of patients, which represent opportunities in a given marketplace. In general, the patient flow component recreates the structure and magnitude of patient movements within a simulation environment representing an indication marketplace. This type of operational examination of market dynamics becomes a useful commercial evaluation tool. In addition, it can help inform and test key marketing strategies considered for an NCE s brand plan designed to maximize that potential. [Pg.632]

Figure 5. The aspect of the grafted rayon fabrics after the flammability test. Key left to right, P-1 grafted compact rayon fabric P-2 grafted compact rayon fabric P-3 grafted rayon fabric P-4 grafted rayon fabric P-1 grafted lower compact rayon fabric P-2 grafted lower compact rayon fabric P-3 grafted lower compact rayon fabric P-4 lower compact grafted fabric. Figure 5. The aspect of the grafted rayon fabrics after the flammability test. Key left to right, P-1 grafted compact rayon fabric P-2 grafted compact rayon fabric P-3 grafted rayon fabric P-4 grafted rayon fabric P-1 grafted lower compact rayon fabric P-2 grafted lower compact rayon fabric P-3 grafted lower compact rayon fabric P-4 lower compact grafted fabric.
EPRI (1993) Whole Tree Energy Design, Volume 2 Program to Test Key Elements of WTE, TR-101564v.2, Electric Power Research Institute. [Pg.823]

Such a scheme is intended to be used as follows Everybody who may want to sign messages generates such a key pair. She keeps the signing key secret and publishes the test key. (For simplicity, signers will always be assumed to be female and recipients male, corresponding to the names used in the figures.) Alternatively, the two keys are therefore called secret key (or private key) and public key, respectively. [Pg.14]

Everybody can now sign messages with their own signing keys, whereas all the other participants can test these signatures with the correspondng test key. [Pg.14]

There are schemes without a public key in the usual sense instead, every recipient has a different test key. [Pg.50]

More generally, with schemes where every entity of a recipient may obtain a different test key, the number of the round where the first broadcast within this initialization occurred is knowledge common to all the entities participating in this initialization and can therefore serve as the identity. [Pg.69]

This section contains criteria that characterize signature schemes whose structure is less complex than the general case. Moreover, all the familiar notions of signatures, signing and test algorithms, secret keys, test keys, and public keys, are redefined for special classes of signature schemes. All the properties are described in terms of the systems derived firom the schemes. [Pg.105]

The constant information that the entity uses in each test is called a test key. (It is not necessarily a public key, though, because different recipients and courts may have different constant test keys.)... [Pg.108]

Initialization is very complex All entities of recipients and courts play an active role in a protocol in several rounds over a broadcast channel. Each entity has its own specific test key at the end. [Pg.133]

There exists a distributed variant of authentication for this scheme (see Section 5.2.11), i.e., a protocol where either all the recipients accept a signature or none does [PfWa92b]. This is not trivial, even if reliable broadcast channels are given, because the entities of the recipients have different test keys. [Pg.134]

The first basic idea is that the entities of all recipients and courts must have different test keys, i.e., there is no public key. Thus an unrestricted attacker does not know how a recipient s entity tests a signature, and therefore the attack by exhaustive search mentioned under Security Limits in Section 2.3 is no longer applicable. [Pg.147]

A outputs a triple (acc, ids f, sk), where sk is called a secret key, and outputs a triple (acc, ids f, t), where t is called a test key. Thus Gen defines probabilistic assignments of the form... [Pg.361]

The basic idea for the proof is formalized similar to Lemma 11.16 Even if some test keys are known, any other test key still gives a lot of information about the correct signature. [Pg.364]

The abbreviated names of the constructions mean bottom-up tree authentication (10.9), top-down tree authentication (10.13), top-down tree authentication with a small amount of private storage (10.19), the discrete-logarithm scheme with minimized secret key (10.22) without combination with tree authentication, and the construction with a list-shaped tree for a fixed recipient from Section 10.6. The first column of lower bounds is for standard fail-stop signature schemes (Sections 11.3 and 11.4), the second one for standard information-theoretically secure signature schemes (Section 11.5) here the length of a test key has been entered in the row with the public keys. [Pg.367]

Design a microscale numerical experiment that tests key assumptions made in the development of the mesoscale model. [Pg.17]

W. Harrer, R, Danzer, P. Supancic, and T. Lube, Influence of sample size on the results of B3B tests. Key Engineering Materials, in print, (2009). [Pg.14]

Figure 7. Foam study done by conventional cylinder shake test Key , O.I tot % quaternary derivative of HEC o, 0,1 wt % hydrophobically modified, quaternary derivative of HEC. Figure 7. Foam study done by conventional cylinder shake test Key , O.I tot % quaternary derivative of HEC o, 0,1 wt % hydrophobically modified, quaternary derivative of HEC.
Rico, A., Garrido, M. A., Otero, E. Rodriguez, J. Roughness Effect on the Mechanical Properties of Ceramic Materials Measured from Nanoindentation Tests. Key Engineering Materials 333, 247-250 (2007). [Pg.128]

Sayer, J. R., Bogard, S. E., Buonarosa, M. L., LeBlanc, D. J., Funkhauser, D. S., Bao, S., et al. (2011). Integrated Vehicle-Based Safety Systems. light-Vehicle Field Operational Test Key Findings Report. Report DOT HS 811 416, The University of Michigan Transportation Research Institute. [Pg.48]

The method tests key functions of the system such as peak integration, quantitation, printout, and file storage and retrieval. [Pg.29]

Model compound 2.1.1 was designed to test key reactions, which may be applied to the total synthesis, such as intramolecular Diels-Alder reaction, Wessely oxidative dearomatization reaction, and Pinhey arylation. The synthetic strategy of model research is shown in Fig. 2.16 compound 2.1.1 could be constructed from the precursor 2.1.2 after IMDA. Compound 2.1.2 could be prepared from compound 2.1.3 through esterification. Compound 2.1.3 could be obtained from 2.1.4 by reduction. Compound 2.1.4 was designed to be obtained by Pinhey arylation between 1,3-keto ester compounds 2.1.5 and organic lead compound 2.1.6. The advantage of this model system is that it contains three key reactions in total synthesis design, which can effectively supply the synthetic information for the total synthesis. [Pg.49]


See other pages where Test key is mentioned: [Pg.223]    [Pg.223]    [Pg.301]    [Pg.73]    [Pg.108]    [Pg.49]    [Pg.13]    [Pg.16]    [Pg.116]    [Pg.360]    [Pg.361]    [Pg.362]    [Pg.363]    [Pg.364]    [Pg.365]    [Pg.366]    [Pg.229]    [Pg.95]    [Pg.95]    [Pg.390]    [Pg.777]    [Pg.243]    [Pg.480]   
See also in sourсe #XX -- [ Pg.13 , Pg.108 , Pg.361 ]




SEARCH



Key Definitions and Testing Procedures

Main public key test

© 2024 chempedia.info