Receive Sample Clauses

Receive. Receive," as it relates to notice to a financial institution, means receipt in the office or branch office of the financial institution in which the account is established or, if the terms of the account require notice at a particular place, in the place required. [PL 2017, c. 402, Pt. A, §2 (NEW); PL 2019, c. 417, Pt. B, §14 (AFF).]
AutoNDA by SimpleDocs
Receive off-load and provide for safe storage, various component pieces that may arrive at the installation site prior to the commencement of installation.
Receive a wage increase of a further 5%, this increase to apply as from the first full
Receive a Rap Back subscription renewals list from Participants and transmit this information to the FBI;
Receive. The Receive Service allows the Client to receive fax messages as TIFF file attachments to one or more email addresses via a unique telephone number. The Receive Service is subscription based and its price is indicated on the Order Form which may be updated from time to time. In some territories, numbers allocated to the Client may be premium rate numbers, calls to which may be charged at different rates by the local telecom provider.
Receive engineering approval of the project plan;
AutoNDA by SimpleDocs
Receive accept, expend and disburse funds for purposes consistent with the terms of this Agreement and the duly adopted By-Laws of the Trust.
Receive. 2SM-Receive takes a state σ and a ciphertext c, and outputs a new state σj and a plaintext message m. We assume that 2SM runs on top of the ACB layer, which retransmits any messages that were dropped or tampered with, and authenticates message senders (see Section 5). The 2SM module therefore assumes reliable delivery, and focuses on providing confidentiality with forward secrecy and PCS. The two parties communicating via 2SM can send each other messages in any order, or even concurrently. The Signal protocol is a popular implementation of 2SM, but it does not suffice for our purposes because it heals from a corruption only after several rounds of communication, not with each message sent. On the other hand, several other 2SM protocols proposed in the literature [17, 23, 24, 38] sacrifice efficiency by not assuming authentic message delivery. We instead use a simplified variant of the protocols by Xxxx et al. [24] and Xxxxx and Xxxxxxxx [17]. The specification of our 2SM protocol is given in Figure 2. Our starting point is an IND-CPA-secure public-key encryption scheme PKE = (PKE-Gen, PKE-Enc, PKE-Dec) as defined in Appendix B. Each party updates their public key every time they send a message, which easily provides PCS. To ensure forward secrecy, when one party sends a message, they also generate a new PKE key pair for the other party, include its secret key in the ciphertext, delete their own copy of the secret key, and keep the public key for the next time they send a message. Upon receiving this message, the other party deletes their old secret key and replaces it with the given one. Each of the functions in Figure 2 implicitly takes the current state σ as argument, and returns the updated state σj. 2SM-Send first generates new PKE key pairs for both parties, and stores the secret key for itself at the next unused index in the array σ.mySks. The message m is then encrypted using σ.otherPk, which is either the last public key we generated for the other party, or the last public key we received from the other party, whichever was more recent. σ.otherPkSender is the constant string "me" in the former case, and "other" in the latter case. otherPkSender and otherPkIndex are included in the message as metadata to indicate which of the recipient’s public keys is being used. 2SM-Receive uses the message’s metadata to determine which secret key to use for decryption, as- signing it to sk. In case it is a secret key generated by ourselves, that secret key and al...
Receive. It is often major differences between the return list and the actual container content. The employees must therefore check every item in the returned container and make registrations in the system of each unique serial number. This is a very time consuming part of the process and this activity is one of the reasons why the employees spend over 37 % of their time in the office. A way to make this activity more effective and reduce the time spent in the office is to initiate an investigation to determine whether radio frequent identification (RFID) or similar concepts can be suitable tools to increase efficiency (ref. Smart management TAGHUB, 06.04.2011). Another initiative to improve this situation is to charge the projects of the missing equipment. Economic disadvantages will put a higher pressure on the offshore xxxxxxx to assure correct return shipments.
Time is Money Join Law Insider Premium to draft better contracts faster.