Receive. Receive," as it relates to notice to a financial institution, means receipt in the office or branch office of the financial institution in which the account is established or, if the terms of the account require notice at a particular place, in the place required. [PL 2017, c. 402, Pt. A, §2 (NEW); PL 2019, c. 417, Pt. B, §14 (AFF).]
Receive. The Receive Service allows the Client to receive fax messages as TIFF file attachments to one or more email addresses via a unique telephone number. The Receive Service is subscription based and its price is indicated on the Order Form which may be updated from time to time. In some territories, numbers allocated to the Client may be premium rate numbers, calls to which may be charged at different rates by the local telecom provider.
Receive. 2SM-Receive takes a state σ and a ciphertext c, and outputs a new state σj and a plaintext message m. We assume that 2SM runs on top of the ACB layer, which retransmits any messages that were dropped or tampered with, and authenticates message senders (see Section 5). The 2SM module therefore assumes reliable delivery, and focuses on providing confidentiality with forward secrecy and PCS. The two parties communicating via 2SM can send each other messages in any order, or even concurrently. The Signal protocol is a popular implementation of 2SM, but it does not suffice for our purposes because it heals from a corruption only after several rounds of communication, not with each message sent. On the other hand, several other 2SM protocols proposed in the literature [17, 23, 24, 38] sacrifice efficiency by not assuming authentic message delivery. We instead use a simplified variant of the protocols by Xxxx et al.  and Xxxxx and Xxxxxxxx . The specification of our 2SM protocol is given in Figure 2. Our starting point is an IND-CPA-secure public-key encryption scheme PKE = (PKE-Gen, PKE-Enc, PKE-Dec) as defined in Appendix B. Each party updates their public key every time they send a message, which easily provides PCS. To ensure forward secrecy, when one party sends a message, they also generate a new PKE key pair for the other party, include its secret key in the ciphertext, delete their own copy of the secret key, and keep the public key for the next time they send a message. Upon receiving this message, the other party deletes their old secret key and replaces it with the given one. Each of the functions in Figure 2 implicitly takes the current state σ as argument, and returns the updated state σj. 2SM-Send first generates new PKE key pairs for both parties, and stores the secret key for itself at the next unused index in the array σ.mySks. The message m is then encrypted using σ.otherPk, which is either the last public key we generated for the other party, or the last public key we received from the other party, whichever was more recent. σ.otherPkSender is the constant string "me" in the former case, and "other" in the latter case. otherPkSender and otherPkIndex are included in the message as metadata to indicate which of the recipient’s public keys is being used. 2SM-Receive uses the message’s metadata to determine which secret key to use for decryption, as- signing it to sk. In case it is a secret key generated by ourselves, that secret key and al...
Receive catalog, track, and maintain an inventory of the specimens that arrive for evaluation:
Receive a wage increase of 3% or CPI (as at the March quarter (Adelaide Base) which ever is the greater value) to current Enterprise Bargaining rates being applied to each designated level as from first full pay period after 1 June 2014. 13.1.2 Receive a further 3% or CPI (as at the March quarter (Adelaide Base) which ever is the greater value) wage increase being applied to each designated level as from first full pay period after 1 June 2015.