Network structures that require the use of a common database are affected by the risk of processing identification data that are necessary for sharing information and updating and processing data with equal access level between the network nodes. However, this sharing could lead risks of vulnerability when identification data are exchanged between the nodes of the network. The proposed information system involves the exchange of information by encrypting the identification data with an MD5 Hashing procedure (RFC1321).
Technologies
In this section it is possible to view, also through targeted research, the technologies inserted in the PROMO-TT Database. For further information on the technologies and to contact the CNR Research Teams who developed them, it is necessary to contact the Project Manager (see the references at the bottom of each record card).
Displaying results 1 - 2 of 2
X-ray imaging techniques can work in i) "full-field mode" in which the object to study (or part of it) is completely illuminated by the X-ray beam; ii) "scanning mode" in which an X-ray beam, focused through an opportune optics, illuminates in succession contiguous areas of the sample under examination, and the transmitted wave is measured by a detector placed at a proper distance from it. One of these X-ray scanning microscopes is available at the facility (X-ray MicroImaging, XMIL@b) of the Institute of Crystallography (CNR-Bari).